Abstract

Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily identifies the changes made in the data due to proper structure. The developed model supports privacy-preserving public auditing to provide a secure cloud storage system. The data owners upload the data in the cloud and edit the data using the private key. An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches. The data files requested by the data owner are audit by a third-party auditor and the multi-owner authentication method is applied during the modification process to authenticate the user. The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish.

Highlights

  • IntroductionCloud computing has been adopted in many organizations to store and process data in an efficient manner and any organizations prefer cloud computing due to its advantages of scalability, flexibility

  • The cloud computing paradigm has become standard for computer services due to its flexible computational abilities and high storage capacity

  • An enhanced Merkle hash tree with a multi-owner authentication technique is used for cloud data security

Read more

Summary

Introduction

Cloud computing has been adopted in many organizations to store and process data in an efficient manner and any organizations prefer cloud computing due to its advantages of scalability, flexibility. User outsources the data in the cloud to store and process the data due to its scalability and flexibility. Cloud Service Provider (CSP) has to preserve the privacy of the sensitive data and the user has the option of encrypting the data before uploading in the cloud [3,4]. Guarantee cloud data security and users access control are the current security issues in the cloud [9,10]. A trusted Third-Party Auditor (TPA) is applied to verify the cloud data to reduce the burden on users, this is called public auditing. The TPA may have unnecessary access to private information in the auditing process [11,12]

Methods
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.