The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: Remote data storage becomes the hype nowadays as various organizations provide free access of the application. Security and efficiency are the major concerns while using such kind of application. Hence solution related to data integrity verification needs to be focused to achieve reliability. Methods/Statistical Analysis: Despite of all the hype surrounding the storage and security solutions, clients are still hesitant to deploy their business in the cloud. As security is the major concerns which may become the hindrance as clients are more concern about data privacy and data protection. In proposed work we have provided solution of efficiency and security related to remote data storage using additive homomorphic encryption. Findings: Solution to this can be provided using some of the data integrity proofs techniques. The advent of an advanced model of the security to provide the solution should not negotiate with the required efficiency and reliability present in the current solutions. Additive homomorphic encryption has been proven to efficient compared to multiplicative homomorphic encryption. Additive homomorphic encryption is efficient compare to multiplicative homomorphic encryption which provides better efficiency. Applications/Improvements: Methodology given could be useful for remote file storage applications. Proposed algorithm has been implemented and tested. The results shows that it gives improvement over the existing solution in terms of tag generation and verification.

Keywords

Additive Homomorphism, Data Integrity Proof, Encryption, Efficiency, Remote Storage.
User