An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing

被引:0
|
作者
Kamboj, Minakshi [1 ]
Rana, Sanjeev [2 ]
机构
[1] MM Deemed Univ, CSE Dept MMEC, Ambala, Haryana, India
[2] MM Deemed Univ, MMEC, Ambala, Haryana, India
关键词
Shamir secret sharing; Effective integrity verification scheme; Advance encryption system; Message authentication code;
D O I
10.1007/978-3-030-96299-9_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is growing in quality thanks to its ability to supply dynamically ascendible resources provisioned as services no matter user or location device. However, moving knowledge to the cloud means the management of the info is a lot of within the hands of the cloud supplier instead of the info owner. Despite the advantages that the cloud presents, cloud computing technology is moon-faced with a range of legal and technological challenges. Security and privacy are amongst the most important challenges as known. There should be certain type of system to guarantee the integrity of the records. The current Cloud safety model is sited on the interpretation that the client should trust the source. Guaranteeing documents integrity needs a promise of trust among the customer and the supplier. Numerous cryptographic methods have been developed and used to deliver improved safety for the sake of keeping integrity issues. We assume that our file (F) is divided into n shares. Poly1305 could be a cryptographically message authentication code (MAC). It is often wont to verify the info integrity and therefore the legitimacy of a message. Shamir Secret Sharing is used to split client file into n shares and these shares are further encrypted using poly1305. An Effective Integrity Verification Scheme (EIVS) based SSS and Poly-1305 is implemented and compared with SSS-AES. Entropy and Timing analysis of EIVS is done for short, long and larger text files.
引用
收藏
页码:42 / 54
页数:13
相关论文
共 50 条
  • [1] A data integrity verification scheme in mobile cloud computing
    Lin, Chen
    Shen, Zhidong
    Chen, Qian
    Sheldon, Frederick T.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 146 - 151
  • [2] Ensuring Data Integrity in Cloud Computing
    Kumarga, N. Praveen
    Sireesha, D.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 34 - 38
  • [3] An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
    Luo, Xiling
    Zhou, Zequan
    Zhong, Lin
    Mao, Jian
    Chen, Chaoyong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [4] The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing
    Rukavitsyn, Andrey N.
    Borisenko, Konstantin A.
    Holod, Ivan I.
    Shorov, Andrey V.
    [J]. PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 272 - 274
  • [5] Ensuring Data Integrity in the Cloud
    Cahilly, Monica
    [J]. LC GC NORTH AMERICA, 2020, 38 (10) : 586 - 586
  • [6] Cloud Audit: A Data Integrity Verification Approach for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 142 - 151
  • [7] Data integrity verification: a novel approach for cloud computing
    Rajat Saxena
    Somnath Dey
    [J]. Sādhanā, 2019, 44
  • [8] Improving Dynamic Data Integrity Verification in Cloud Computing
    Khatri, Trushna S.
    Jethava, G. B.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [9] Data integrity verification: a novel approach for cloud computing
    Saxena, Rajat
    Dey, Somnath
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (03):
  • [10] Public Auditing Scheme for Cloud Data Integrity Verification
    Hiremath, Shivarajkumar
    Kunte, R. Sanjeev
    [J]. INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 237 - 246