Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

被引:8
|
作者
Jayaprakash, J. Stanly [1 ]
Balasubramanian, Kishore [2 ]
Sulaiman, Rossilawati [3 ]
Hasan, Mohammad Kamrul [3 ]
Parameshachari, B. D. [4 ]
Iwendi, Celestine [5 ]
机构
[1] Mahendra Inst Technol, Dept CSE, Namakkal 637503, India
[2] Dr Mahalingam Coll Engn & Technol, Dept EEE, Pollachi 642003, India
[3] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Malaysia
[4] GSSS Inst Engn & Technol Women, Dept Telecommun Engn, Mysuru, India
[5] Univ Bolton, Sch Creat Technol, Deane Rd, Bolton, England
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 72卷 / 01期
关键词
Cloud computing; cloud data storage; cloud service provider; merkle hash tree; multi-owner authentication; third-party auditor; SCHEME;
D O I
10.32604/cmc.2022.021269
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily identifies the changes made in the data due to proper structure. The developed model supports privacy-preserving public auditing to provide a secure cloud storage system. The data owners upload the data in the cloud and edit the data using the private key. An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches. The data files requested by the data owner are audit by a third-party auditor and the multi owner authentication method is applied during the modification process to authenticate the user. The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2-167 ms when compared to the existing Advanced Encryption Standard and Blowfish.
引用
收藏
页码:519 / 534
页数:16
相关论文
共 50 条
  • [21] Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain
    He, Kai
    Huang, Chunxiao
    Shi, Jiaoli
    Hu, Xinrong
    Fan, Xiying
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [22] Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree
    Rao, Lu
    Zhang, Hua
    Tu, Tengfei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) : 451 - 463
  • [23] Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT
    Nesa, Nashreen
    Banerjee, Indrajit
    [J]. TRANSACTIONS ON COMPUTATIONAL SCIENCE XXXV: SPECIAL ISSUE ON SIGNAL PROCESSING AND SECURITY IN DISTRIBUTED SYSTEMS, 2020, 11960 : 85 - 105
  • [24] A Design of Efficient Multi-Authentication Scheme Using a Merkle Hash Tree in the Smart Home Environments
    Kim, Mansik
    Choi, Won-Kyu
    Jun, Moon-Seog
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2538 - 2542
  • [25] Novel Modelling of the Hash-based Authentication of Data in Dynamic Cloud Environment
    Kumar, Anil G.
    Shantala, C. P.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) : 269 - 275
  • [26] Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience
    Koo, Dongyoung
    Shin, Youngjoo
    Yun, Joobeom
    Hur, Junbeom
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [27] Blockchain-Based Dynamic Cloud Data Integrity Auditing via Non-Leaf Node Sampling of Rank-Based Merkle Hash Tree
    Wang, Chenxu
    Sun, Yifan
    Liu, Boyang
    Xue, Lei
    Guan, Xiaohong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 3931 - 3942
  • [28] A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud
    Chen, Fei
    Xiang, Tao
    Chen, Jianyong
    Yu, Wei
    Fu, Xinwen
    Zhang, Shengyu
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, 2015, : 219 - 226
  • [29] A Biometric Based Authentication and Encryption Framework for Sensor Health Data in Cloud
    Sharma, Surender
    Balasubramanian, Venki
    [J]. PROCEEDINGS OF THE 2014 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MULTIMEDIA (ICIM), 2014, : 49 - 54
  • [30] Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree
    He, Kai
    Shi, Jiaoli
    Huang, Chunxiao
    Hu, Xinrong
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III, 2020, 12454 : 65 - 80