Open Access Open Access  Restricted Access Subscription Access

Improved Data Integrity Proofs using Additive Homomorphic Encryption for Remote Storage


Affiliations
1 Department of Information Technology, Chandubhai S Patel Institute of Technology, Charusat, Changa - 388421, Gujarat, India
2 Department of Computer Engineering, Chandubhai S Patel Institute of Technology, Charusat, Changa - 388421, Gujarat, India
 

Background/Objectives: Remote data storage becomes the hype nowadays as various organizations provide free access of the application. Security and efficiency are the major concerns while using such kind of application. Hence solution related to data integrity verification needs to be focused to achieve reliability. Methods/Statistical Analysis: Despite of all the hype surrounding the storage and security solutions, clients are still hesitant to deploy their business in the cloud. As security is the major concerns which may become the hindrance as clients are more concern about data privacy and data protection. In proposed work we have provided solution of efficiency and security related to remote data storage using additive homomorphic encryption. Findings: Solution to this can be provided using some of the data integrity proofs techniques. The advent of an advanced model of the security to provide the solution should not negotiate with the required efficiency and reliability present in the current solutions. Additive homomorphic encryption has been proven to efficient compared to multiplicative homomorphic encryption. Additive homomorphic encryption is efficient compare to multiplicative homomorphic encryption which provides better efficiency. Applications/Improvements: Methodology given could be useful for remote file storage applications. Proposed algorithm has been implemented and tested. The results shows that it gives improvement over the existing solution in terms of tag generation and verification.

Keywords

Additive Homomorphism, Data Integrity Proof, Encryption, Efficiency, Remote Storage.
User

Abstract Views: 136

PDF Views: 0




  • Improved Data Integrity Proofs using Additive Homomorphic Encryption for Remote Storage

Abstract Views: 136  |  PDF Views: 0

Authors

Parth Shah
Department of Information Technology, Chandubhai S Patel Institute of Technology, Charusat, Changa - 388421, Gujarat, India
Amit Ganatra
Department of Computer Engineering, Chandubhai S Patel Institute of Technology, Charusat, Changa - 388421, Gujarat, India

Abstract


Background/Objectives: Remote data storage becomes the hype nowadays as various organizations provide free access of the application. Security and efficiency are the major concerns while using such kind of application. Hence solution related to data integrity verification needs to be focused to achieve reliability. Methods/Statistical Analysis: Despite of all the hype surrounding the storage and security solutions, clients are still hesitant to deploy their business in the cloud. As security is the major concerns which may become the hindrance as clients are more concern about data privacy and data protection. In proposed work we have provided solution of efficiency and security related to remote data storage using additive homomorphic encryption. Findings: Solution to this can be provided using some of the data integrity proofs techniques. The advent of an advanced model of the security to provide the solution should not negotiate with the required efficiency and reliability present in the current solutions. Additive homomorphic encryption has been proven to efficient compared to multiplicative homomorphic encryption. Additive homomorphic encryption is efficient compare to multiplicative homomorphic encryption which provides better efficiency. Applications/Improvements: Methodology given could be useful for remote file storage applications. Proposed algorithm has been implemented and tested. The results shows that it gives improvement over the existing solution in terms of tag generation and verification.

Keywords


Additive Homomorphism, Data Integrity Proof, Encryption, Efficiency, Remote Storage.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i29%2F131174