An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud

被引:8
作者
Neela, K. L. [1 ]
Kavitha, V [2 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Thirukkuvalai, Tamil Nadu, India
[2] Univ Coll Engn, Dept Comp Sci & Engn, Kancheepuram, Tamil Nadu, India
关键词
Cloud computing; Data security; Authentication; Fingerprint; Integrity; AUTHENTICATION SCHEME; PRIVACY; ENCRYPTION; PROTECTION; SECURITY; PROTOCOL;
D O I
10.1007/s11277-021-09248-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Cloud Environment provides storage for files as well as sharing services for disseminated clients. This technology helps users in the cloud to outsource their data and get good quality services from the cloud. Often, Data Integrity is a serious issue in Cloud Storage because the service provider is a semi-trusted one. Consequently, a self-determining auditing service is essential to check data integrity. In this paper, we developed a secure Cloud Storage environment without a third-party system and proposed an Improved Rivest-Shamir-Adleman Encryption Algorithm (IREA) along with the Flexible Capacity Cuckoo Filter (FCCF) auditing technique without Third Party Auditing. In this proposed system, the data owner encrypts the data using Improved RSA and stores it in the Cloud Service, and users alone can decrypt the data with the knowledge of the data owner. Furthermore, the FCCF ensures the integrity of the verification and secure data transactions can be provided by using the Two Level Quick Response (2LQR) code. The experimental results validate that the proposed IREA-FCCF with the 2LQR technique for data security in a CE has less time compared to that of the existing schemes in terms of encryption time, decryption time, signature generation, signature verification, and cost of the dynamic records.
引用
收藏
页码:2431 / 2448
页数:18
相关论文
共 50 条
  • [31] External integrity verification for outsourced big data in cloud and IoT: A big picture
    Liu, Chang
    Yang, Chi
    Zhang, Xuyun
    Chen, Jinjun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 : 58 - 67
  • [32] Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage
    Huang, Longxia
    Zhou, Junlong
    Zhang, Gongxuan
    Sun, Jin
    Wang, Tian
    Vajdi, Ahmadreza
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (11)
  • [33] Public integrity verification for data sharing in cloud with asynchronous revocation
    Song, Wei
    Wu, Yu
    Cui, Yihui
    Liu, Qilie
    Shen, Yuan
    Qiu, Zicheng
    Yao, Jianjun
    Peng, Zhiyong
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (01) : 33 - 43
  • [34] Modelling a secure framework for data verification and integrity in cloud environment
    Nagesh, Puvvada
    Srinivasu, N.
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [35] Dynamic List Based Data Integrity Verification in Cloud Environment
    Akshay K.C.
    Muniyal B.
    [J]. Journal of Cyber Security and Mobility, 2022, 11 (03): : 433 - 460
  • [37] Data Integrity and Availability Verification Game in Untrusted Cloud Storage
    Djebaili, Brahim
    Kiennert, Christophe
    Leneutre, Jean
    Chen, Lin
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 287 - 306
  • [38] An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function
    Garg, Preeti
    Sharma, Vineet
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 334 - 339
  • [39] Efficient Architecture for Secure Outsourcing of Data and Computation in Hybrid Cloud
    Lunawat, Sonali
    Patankar, Abhijit
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 380 - 383
  • [40] Prediction of availability and integrity of cloud data using soft computing technique
    Pitchai, R.
    Babu, S.
    Supraja, P.
    Anjanayya, S.
    [J]. SOFT COMPUTING, 2019, 23 (18) : 8555 - 8562