Abstract

Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them plays an important role in the successful achievement of the other. In cloud computing data integrity assurance is one of the major challenges because the user has no control over the security mechanism to protect the data. Data integrity insures that data received are the same as data stored. It is a result of data security but data integrity refers to validity and accuracy of data rather than protect the data. Data security refers to protection of data against unauthorized access, modification or corruption and it is necessary to ensure data integrity. This paper proposed a new approach using Matrix Dialing Method in block level to enhance the performance of both data integrity and data security without using Third Party Auditor (TPA). In this approach, the data are partitioned into number of blocks and each block converted into a square matrix. Determinant factor of each matrix is generated dynamically to ensure data integrity. This model also implements a combination of AES algorithm and SHA-1 algorithm for digital signature generation. Data coloring on digital signature is applied to ensure data security with better performance. The performance analysis using cloud simulator shows that the proposed scheme is highly efficient and secure as it overcomes the limitations of previous approaches of data security using encryption and decryption algorithms and data integrity assurance using TPA due to server computation time and accuracy.

Highlights

  • Cloud computing is a modern computing paradigm in which scalable resources are shared dynamically as various services over the internet [1]

  • This paper presents a new technique for enhancing data security through improving data integrity violation checking over the cloud storage without using Third Party Auditor (TPA)

  • Digital signature is applied on each determinant factor to enhance data integrity assurance

Read more

Summary

Introduction

Cloud computing is a modern computing paradigm in which scalable resources are shared dynamically as various services over the internet [1]. The performance of data integrity is measured by using the parameters like computation time, encryption time and decryption time, memory utilization and output size While outsourcing their data using cloud storage does not maintain a local copy. In paper [9], to evaluate the performance of the encryption algorithm for text files, it uses AES, DES [10] [11] and RSA algorithm and the parameters such as computation time, memory usage, and output bytes are considered. In paper [17] and paper [18], the performance evaluation of AES and Blowfish algorithms is discussed [19] The parameters such as time consumption of packet size for 64 bit encodings and hexadecimal encodings, performance for encryption of text files and the throughput are considered.

Proposed Methodology
Comparison of Results and Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call