An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud

被引:8
|
作者
Neela, K. L. [1 ]
Kavitha, V [2 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Thirukkuvalai, Tamil Nadu, India
[2] Univ Coll Engn, Dept Comp Sci & Engn, Kancheepuram, Tamil Nadu, India
关键词
Cloud computing; Data security; Authentication; Fingerprint; Integrity; AUTHENTICATION SCHEME; PRIVACY; ENCRYPTION; PROTECTION; SECURITY; PROTOCOL;
D O I
10.1007/s11277-021-09248-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Cloud Environment provides storage for files as well as sharing services for disseminated clients. This technology helps users in the cloud to outsource their data and get good quality services from the cloud. Often, Data Integrity is a serious issue in Cloud Storage because the service provider is a semi-trusted one. Consequently, a self-determining auditing service is essential to check data integrity. In this paper, we developed a secure Cloud Storage environment without a third-party system and proposed an Improved Rivest-Shamir-Adleman Encryption Algorithm (IREA) along with the Flexible Capacity Cuckoo Filter (FCCF) auditing technique without Third Party Auditing. In this proposed system, the data owner encrypts the data using Improved RSA and stores it in the Cloud Service, and users alone can decrypt the data with the knowledge of the data owner. Furthermore, the FCCF ensures the integrity of the verification and secure data transactions can be provided by using the Two Level Quick Response (2LQR) code. The experimental results validate that the proposed IREA-FCCF with the 2LQR technique for data security in a CE has less time compared to that of the existing schemes in terms of encryption time, decryption time, signature generation, signature verification, and cost of the dynamic records.
引用
收藏
页码:2431 / 2448
页数:18
相关论文
共 50 条
  • [31] Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation
    Zhang, Yuan
    Xu, Chunxiang
    Liang, Xiaohui
    Li, Hongwei
    Mu, Yi
    Zhang, Xiaojun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 676 - 688
  • [32] An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing
    Kamboj, Minakshi
    Rana, Sanjeev
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2021, 2022, 419 : 42 - 54
  • [33] DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
    Zhang, Xiaojun
    Zhao, Jie
    Xu, Chunxiang
    Wang, Huaxiong
    Zhang, Yuan
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 334 - 345
  • [34] Data Integrity Verification in Hybrid Cloud Using TTPA
    Subha, T.
    Jayashri, S.
    NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 149 - 159
  • [35] Data integrity verification: a novel approach for cloud computing
    Rajat Saxena
    Somnath Dey
    Sādhanā, 2019, 44
  • [36] Cloud data integrity verification scheme for associated tags
    Tian, Junfeng
    Jing, Xuan
    COMPUTERS & SECURITY, 2020, 95 (95)
  • [37] Improving Dynamic Data Integrity Verification in Cloud Computing
    Khatri, Trushna S.
    Jethava, G. B.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [38] Public Auditing Scheme for Cloud Data Integrity Verification
    Hiremath, Shivarajkumar
    Kunte, R. Sanjeev
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 237 - 246
  • [39] A Cloud Data Integrity Verification Scheme Based on Blockchain
    Bai, Yi
    Zhou, Zequan
    Luo, Xiling
    Wang, Xiaochao
    Liu, Feng
    Xu, Yifu
    2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 357 - 363
  • [40] A data integrity verification scheme in mobile cloud computing
    Lin, Chen
    Shen, Zhidong
    Chen, Qian
    Sheldon, Frederick T.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 146 - 151