An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud

被引:8
作者
Neela, K. L. [1 ]
Kavitha, V [2 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Thirukkuvalai, Tamil Nadu, India
[2] Univ Coll Engn, Dept Comp Sci & Engn, Kancheepuram, Tamil Nadu, India
关键词
Cloud computing; Data security; Authentication; Fingerprint; Integrity; AUTHENTICATION SCHEME; PRIVACY; ENCRYPTION; PROTECTION; SECURITY; PROTOCOL;
D O I
10.1007/s11277-021-09248-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Cloud Environment provides storage for files as well as sharing services for disseminated clients. This technology helps users in the cloud to outsource their data and get good quality services from the cloud. Often, Data Integrity is a serious issue in Cloud Storage because the service provider is a semi-trusted one. Consequently, a self-determining auditing service is essential to check data integrity. In this paper, we developed a secure Cloud Storage environment without a third-party system and proposed an Improved Rivest-Shamir-Adleman Encryption Algorithm (IREA) along with the Flexible Capacity Cuckoo Filter (FCCF) auditing technique without Third Party Auditing. In this proposed system, the data owner encrypts the data using Improved RSA and stores it in the Cloud Service, and users alone can decrypt the data with the knowledge of the data owner. Furthermore, the FCCF ensures the integrity of the verification and secure data transactions can be provided by using the Two Level Quick Response (2LQR) code. The experimental results validate that the proposed IREA-FCCF with the 2LQR technique for data security in a CE has less time compared to that of the existing schemes in terms of encryption time, decryption time, signature generation, signature verification, and cost of the dynamic records.
引用
收藏
页码:2431 / 2448
页数:18
相关论文
共 50 条
[41]   An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique [J].
Mohis, M. ;
Devipriya, V. S. .
2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, :308-312
[42]   Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments [J].
Rong, Hong ;
Wang, Huimei ;
Liu, Jian ;
Wu, Wei ;
Xian, Ming .
2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, :236-243
[43]   Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud server [J].
Kumar, Malay ;
Vardhan, Manu .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) :1251-1263
[44]   Efficient Multi-Replica Cloud Data Integrity Checking Method Based on Enhanced PRF [J].
George, Anju Susan ;
Nargunam, A. Shajin .
IETE JOURNAL OF RESEARCH, 2024, 70 (01) :396-404
[45]   DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage [J].
Zheng, Xiangshuo ;
Shen, Wenting ;
Su, Ye ;
Gao, Yuan .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01) :299-316
[46]   An Efficient User's Attribute Revocation Scheme Suitable for Data Outsourcing in Cloud Storage [J].
Zheng, Fang ;
Peng, Xinguang ;
Li, Zhidan .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
[47]   Improving cloud data security through hybrid verification technique based on biometrics and encryption system [J].
Hossain M.A. ;
Al Hasan M.A. .
International Journal of Computers and Applications, 2022, 44 (05) :455-464
[48]   Two-Level Verification of Data Integrity for Data Storage in Cloud Computing [J].
Xu, Guangwei ;
Chen, Chunlin ;
Wang, Hongya ;
Zang, Zhuping ;
Pang, Mugen ;
Jiang, Ping .
ADVANCED RESEARCH ON ELECTRONIC COMMERCE, WEB APPLICATION, AND COMMUNICATION, PT 1, 2011, 143 :439-+
[49]   Verification of data integrity and co-operative loss recovery for secure data storage in cloud computing [J].
Rejin, Paul R. ;
Paul, Raj D. .
COGENT ENGINEERING, 2019, 6 (01)
[50]   An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing [J].
Kumar, Syam P. ;
Subramanian, R. ;
Selvam, Thamizh D. .
2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, :214-219