Abstract

A datacenter in a cloud environment houses a massive quantity of data in a distributed manner. However, with the increasing number of threats like data deduplication attack over the cloud environment, it is quite challenging to ascertain data's full-fledged security. In this regard, data integrity and security are highly questionable. A review of existing literature shows that the existing solutions are not much suitable to meet the requirements and support the existing distributed storage system's security demands concerning data integrity due to the usage of the inferior authentication mechanism. Also, the most frequently used public-key encryption is found not to be purely suitable resource constraint devices. Therefore, this manuscript presents a unique model of authentication of data where a simplified hashing proposition has been designed towards scheduling a distributed chain of data. The idea is to perform dynamic authentication that is present of any form of the adversary. The design of proposed scheme is lightweight which offers cross-verifiable hash-based challenges matching scheme with the provision of the non-repudiation of the tractions using the inclusion of a cloud auditor units. The experiment was carried on numerical computing tool considering, data volume, verification count and verification delay as prime performance metrics. The simulation outcomes shows that the proposed system excels in better security performance as well it is flexible compared to the existing system.

Highlights

  • The collaborative network-based application essentially requires cloud infrastructure to gain various advantages of availability and scalability including data storage requirements

  • The proposed system constructs a test-bed where there are 50 accesses given for cloud auditors and 100 accesses provided for cloud tenants

  • The proposed method's implementation is carried out using MATLAB, where the idea is to testify the effectiveness of the proposed algorithm concerning defined performance parameters

Read more

Summary

Introduction

The collaborative network-based application essentially requires cloud infrastructure to gain various advantages of availability and scalability including data storage requirements. There is various critical application used in the different functional domains of life including healthcare [1], banking [2], automated navigation system [3], transport safety [4], data security [5], secured vehicular network [6], query assessment [7], data authentication [8], selective authentication [9]. In all these applications, compromise of data integrity poses substantial security concerns. Designing a robust and efficient data-authenticator to verify data integrity is an open research problem that requires researchers' attention

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call