Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

被引:8
|
作者
Jayaprakash, J. Stanly [1 ]
Balasubramanian, Kishore [2 ]
Sulaiman, Rossilawati [3 ]
Hasan, Mohammad Kamrul [3 ]
Parameshachari, B. D. [4 ]
Iwendi, Celestine [5 ]
机构
[1] Mahendra Inst Technol, Dept CSE, Namakkal 637503, India
[2] Dr Mahalingam Coll Engn & Technol, Dept EEE, Pollachi 642003, India
[3] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Malaysia
[4] GSSS Inst Engn & Technol Women, Dept Telecommun Engn, Mysuru, India
[5] Univ Bolton, Sch Creat Technol, Deane Rd, Bolton, England
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 72卷 / 01期
关键词
Cloud computing; cloud data storage; cloud service provider; merkle hash tree; multi-owner authentication; third-party auditor; SCHEME;
D O I
10.32604/cmc.2022.021269
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily identifies the changes made in the data due to proper structure. The developed model supports privacy-preserving public auditing to provide a secure cloud storage system. The data owners upload the data in the cloud and edit the data using the private key. An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches. The data files requested by the data owner are audit by a third-party auditor and the multi owner authentication method is applied during the modification process to authenticate the user. The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2-167 ms when compared to the existing Advanced Encryption Standard and Blowfish.
引用
收藏
页码:519 / 534
页数:16
相关论文
共 50 条
  • [1] Merkle Hash Tree based Deduplication in Cloud Storage
    Li, Chaoling
    Chen, Yue
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6223 - 6227
  • [2] Homomorphic Authentication Based on Rank-Based Merkle Hash Tree
    Bai, Ping
    Zhang, Wei
    Wang, Xu An
    Liu, Yudong
    Yang, HaiBin
    Shan, Chun
    [J]. ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 841 - 848
  • [3] Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
    Liu, Zhenpeng
    Wang, Shuo
    Duan, Sichen
    Ren, Lele
    Wei, Jianhang
    [J]. ELECTRONICS, 2023, 12 (03)
  • [4] An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETs
    Moni, Shafika Showkat
    Manivannan, D.
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [5] An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing
    R. Ramya
    T. Sasikala
    [J]. Soft Computing, 2019, 23 : 13423 - 13431
  • [6] An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing
    Ramya, R.
    Sasikala, T.
    [J]. SOFT COMPUTING, 2019, 23 (24) : 13423 - 13431
  • [7] The Cloud Access Control Based on Dynamic Feedback and Merkle Hash Tree
    Yi, Xiushuang
    Wang, Weiqiang
    [J]. 2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 217 - 221
  • [8] A New Broadcast Authentication Method Based on Merkle Tree
    Mang, Luqiao
    [J]. ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 787 - 791
  • [9] Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree
    Zou, Jing
    Sun, Yunchuan
    Li, Shixian
    [J]. 2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 4 - 9
  • [10] Research on E-commerce User Information Encryption Technology Based on Merkle Hash tree
    Qing, Li
    [J]. 2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 365 - 369