Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Venifa Mini, G.
- An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing
Abstract Views :150 |
PDF Views:3
Authors
Affiliations
1 Noorul Islam University, Tamilnadu, IN
2 Department of Computer Science and Engineering, Noorul Islam University, Tamilnadu, IN
1 Noorul Islam University, Tamilnadu, IN
2 Department of Computer Science and Engineering, Noorul Islam University, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 5, No 4 (2013), Pagination: 147-152Abstract
Cloud computing, hitherto a novel technology in modern computing provide the users accessibility to a gamut of resource rich pool of shared computing applications that can be accessed on demand. The cloud data storage service relieves the users from the burden of voluminous local data storage and their maintenance by outsourcing mass data to the cloud. However data outsourcing results in the users losing their physical control of data. The accuracy of data stored in cloud is of paramount importance and this was earlier accomplished by involving a trusted third party to check the integrity of the data. The introduction of a trusted third party may lead to unauthorized exposure of the stored data to other users and also tampering of data. The proposed work envisages an encrypted data integrity checking scheme without a trusted third party auditor to verify the authenticity of the data stored in the cloud by advancing the control of users over their data. This ensures that the data owners have the prospect of securing their sensitive data. This user-centric approach includes data integrity verification and data dynamics. Data Integrity is assured by using ELGAMAL public key cryptography and digital signature scheme. Data dynamics is supported by Merkle B-tree algorithm. Extensive security and performance analysis unequivocally proves that the proposed scheme is highly secure and grossly efficient.Keywords
Authenticated Password Key Exchange, Data Integrity, ElGamal Encryption, Merkle B-Tree, Third Party Auditor.- Secure and Efficient RFID Authentication for Social Network in Cloud
Abstract Views :146 |
PDF Views:2
Authors
Affiliations
1 Noorul Islam University, Tamilnadu, IN
2 Noorul Islam University, IN
1 Noorul Islam University, Tamilnadu, IN
2 Noorul Islam University, IN