An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud

被引:8
|
作者
Neela, K. L. [1 ]
Kavitha, V [2 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Thirukkuvalai, Tamil Nadu, India
[2] Univ Coll Engn, Dept Comp Sci & Engn, Kancheepuram, Tamil Nadu, India
关键词
Cloud computing; Data security; Authentication; Fingerprint; Integrity; AUTHENTICATION SCHEME; PRIVACY; ENCRYPTION; PROTECTION; SECURITY; PROTOCOL;
D O I
10.1007/s11277-021-09248-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Cloud Environment provides storage for files as well as sharing services for disseminated clients. This technology helps users in the cloud to outsource their data and get good quality services from the cloud. Often, Data Integrity is a serious issue in Cloud Storage because the service provider is a semi-trusted one. Consequently, a self-determining auditing service is essential to check data integrity. In this paper, we developed a secure Cloud Storage environment without a third-party system and proposed an Improved Rivest-Shamir-Adleman Encryption Algorithm (IREA) along with the Flexible Capacity Cuckoo Filter (FCCF) auditing technique without Third Party Auditing. In this proposed system, the data owner encrypts the data using Improved RSA and stores it in the Cloud Service, and users alone can decrypt the data with the knowledge of the data owner. Furthermore, the FCCF ensures the integrity of the verification and secure data transactions can be provided by using the Two Level Quick Response (2LQR) code. The experimental results validate that the proposed IREA-FCCF with the 2LQR technique for data security in a CE has less time compared to that of the existing schemes in terms of encryption time, decryption time, signature generation, signature verification, and cost of the dynamic records.
引用
收藏
页码:2431 / 2448
页数:18
相关论文
共 50 条
  • [1] An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud
    K. L. Neela
    V. Kavitha
    Wireless Personal Communications, 2022, 123 : 2431 - 2448
  • [2] A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing
    Jang, Miyoung
    Yoon, Min
    Song, Youngho
    Chang, Jae-Woo
    Advanced Multimedia and Ubiquitous Engineering: Future Information Technology, 2015, 352 : 67 - 72
  • [3] An improved data integrity verification scheme in cloud storage system
    Zhou, En-Guang
    Li, Zhou-Jun
    Guo, Hua
    Jia, Yang-Li
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2014, 42 (01): : 150 - 154
  • [4] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [5] On-demand Integrity Verification Technique for Cloud Data Storage
    Saxena, Rajat
    Dey, Somnath
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2018, 9 (01): : 33 - 50
  • [6] Efficient integrity verification of replicated data in cloud computing system
    Yi, Mingxu
    Wei, Jinxia
    Song, Lingwei
    COMPUTERS & SECURITY, 2017, 65 : 202 - 212
  • [7] An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage
    Xia, Yingjie
    Xia, Fubiao
    Liu, Xuejiao
    Sun, Xin
    Liu, Yuncai
    Ge, Yi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (10): : 3607 - 3623
  • [8] An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud
    Arjun, U.
    Vinay, S.
    EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY, ICERECT 2018, 2019, 545 : 285 - 291
  • [9] Efficient integrity verification of replicated data in cloud using homomorphic encryption
    Raghul Mukundan
    Sanjay Madria
    Mark Linderman
    Distributed and Parallel Databases, 2014, 32 : 507 - 534
  • [10] Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud
    Wang, Boyang
    Li, Hui
    Liu, Xuefeng
    Li, Fenghua
    Li, Xiaoqing
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (06) : 592 - 599