Signature Verification and Bloom Hashing Technique for Efficient Cloud Data Storage

被引:0
作者
R. Senthil kumar
B. G. Geetha
机构
[1] Shree Venkateshwara Hi-Tech Engineering College,Department of Computer Science and Engineering
[2] K. S. Rangasamy College of Technology,Department of Computer Science and Engineering
来源
Wireless Personal Communications | 2018年 / 103卷
关键词
Cloud storage; Data dynamic; Data integrity; Schnorr signature; Bloom hash function; Key generation;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing is a one of the network-based computing that provides services to computer and other cloud devices. Secure cloud data storage is a significant when using the cloud services provided by the service provider in cloud environment. Many research works have been developed to provide secure wireless communication in cloud. However, integrity verification of stored data on cloud was not addressed in an efficient manner. In order to overcome above limitations, bloom hashing based Schnorr signature (BH-SS) technique is proposed. In BH-SS technique, at first, the cloud users send the request to cloud server and it response the user requested data. Next, bloom hash function is used to increase the integrity of cloud data storage. Bloom hash function is an efficient data structure used for storing the data and its hashed value. Bloom hash function stores the various cloud user data in it bits of array by generating hash value for each cloud data. Each data has the diverse hash value in bit array. This helps for BH-SS technique to improve the data integrity and dynamic data storage in cloud environment. Lastly, BH-SS technique employed Schnorr signature to ensure confidentiality of stored data with the aid of producing private signing key and public verification key. Therefore, proposed BH-SS technique improves the data integrity rate and reduces execution time. The BH-SS technique conducts experimental works on the parameters such as data integrity, space complexity, execution time and data confidentiality rate. The experimental results observe that the BH-SS technique is able to enhance the cloud data integrity and also reduces the execution time of cloud storage and space complexity when compared to state-of-the-art-works.
引用
收藏
页码:3079 / 3097
页数:18
相关论文
共 87 条
[1]  
Liu C(2015)MuR- DPA: Top-down levelled multi-replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud IEEE Transactions on Computers 64 2609-2622
[2]  
Ranjan R(2017)Dynamic-hash-table based public auditing for secure cloud storage IEEE Transactions on Services Computing PP 1-14
[3]  
Yang C(2017)BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud Journal of King Saud University – Computer and Information Sciences 137 380-395
[4]  
Zhang X(2018)Secure multi-keyword ranked search over encrypted cloud data for multiple data owners Journal of Systems and Software 4 1-23
[5]  
Wang L(2015)Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway Journal of Cloud Computing: Advances, Systems and Applications 50 165-178
[6]  
Chen J(2016)Key derivation policy for data security and data integrity in cloud computing Automatic Control and Computer Sciences 5 632-655
[7]  
Tian H(2017)DaSCE: Data security for cloud environment with semi-trusted third party IEEE Transactions on Cloud Computing 2 471-484
[8]  
Chen Y(2014)Secure, efficient and fine-grained data access control mechanism for P2P storage cloud IEEE Transactions on Cloud Computing 59 45-49
[9]  
Chang C-C(2016)Secure, efficient and revocable multi-authority access control system in cloud storage Computers & Security 8 1-13
[10]  
Jiang H(2016)Intelligent cryptography approach for secure distributed big data storage in cloud computing Information Sciences 86 3-14