An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud

被引:8
|
作者
Neela, K. L. [1 ]
Kavitha, V [2 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Thirukkuvalai, Tamil Nadu, India
[2] Univ Coll Engn, Dept Comp Sci & Engn, Kancheepuram, Tamil Nadu, India
关键词
Cloud computing; Data security; Authentication; Fingerprint; Integrity; AUTHENTICATION SCHEME; PRIVACY; ENCRYPTION; PROTECTION; SECURITY; PROTOCOL;
D O I
10.1007/s11277-021-09248-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Cloud Environment provides storage for files as well as sharing services for disseminated clients. This technology helps users in the cloud to outsource their data and get good quality services from the cloud. Often, Data Integrity is a serious issue in Cloud Storage because the service provider is a semi-trusted one. Consequently, a self-determining auditing service is essential to check data integrity. In this paper, we developed a secure Cloud Storage environment without a third-party system and proposed an Improved Rivest-Shamir-Adleman Encryption Algorithm (IREA) along with the Flexible Capacity Cuckoo Filter (FCCF) auditing technique without Third Party Auditing. In this proposed system, the data owner encrypts the data using Improved RSA and stores it in the Cloud Service, and users alone can decrypt the data with the knowledge of the data owner. Furthermore, the FCCF ensures the integrity of the verification and secure data transactions can be provided by using the Two Level Quick Response (2LQR) code. The experimental results validate that the proposed IREA-FCCF with the 2LQR technique for data security in a CE has less time compared to that of the existing schemes in terms of encryption time, decryption time, signature generation, signature verification, and cost of the dynamic records.
引用
收藏
页码:2431 / 2448
页数:18
相关论文
共 50 条
  • [41] Data integrity verification: a novel approach for cloud computing
    Saxena, Rajat
    Dey, Somnath
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (03):
  • [42] PIV4DB: Probabilistic Integrity Verification for Cloud Database
    Zhu, Li
    Wang, Pingjian
    Gu, Xiaozhuo
    Wang, Yuewu
    Lin, JingQiang
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 761 - 767
  • [43] A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature
    Zhu, Hongliang
    Yuan, Ting
    Chen, Yuling
    Zha, Taxing
    Xi, Wanting
    Jia, Bin
    Xin, Yang
    IEEE ACCESS, 2019, 7 : 90036 - 90044
  • [44] A Blockchain-Based Efficient Data Integrity Verification Scheme in Multi-Cloud Storage
    Zhang, Yiran
    Geng, Huizheng
    Su, Li
    Lu, Li
    IEEE ACCESS, 2022, 10 : 105920 - 105929
  • [45] Secure data stream outsourcing with publicly verifiable integrity in cloud storage
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Wang, Qiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [46] HB+-MHT: Lightweight and Efficient Data Integrity Verification Scheme for Cloud Virtual Machines
    Yang, Zhi
    Li, Xiaopeng
    Jin, Shuyuan
    Sun, Lei
    Zhang, Zhao
    Yang, Baoshan
    Du, Xuehui
    Chao, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [47] Comments on "Efficient Public Verification of Data Integrity for Cloud Storage Systems From Indistinguishability Obfuscation"
    Peng, Su
    Zhao, Liang
    Kumar, Neeraj
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4113 - 4116
  • [48] Efficient high-end video data privacy preservation with integrity verification in cloud storage
    Megala, G.
    Swarnalatha, P.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [49] A RSA-Based Data Integrity Check without Original Data in the Cloud Computing
    Zhang, Jianhong
    Liu, Xue
    Lu, Chenglian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE, PTS 1-4, 2011, 44-47 : 3726 - +
  • [50] A Trust-Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
    Ghasemi, Simin
    Hadavi, Mohammad Ali
    Niknafs, Mina
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 11 (01): : 3 - 14