The cloud has recently attracted a lot of user attention from both small and large businesses, including those in software, BPO, healthcare, schools, colleges, and many other industries. For data storage and access from remote places linked to one another from a central server with the aid of the internet, all of these organisations attempt to adopt this centralised cloud server. Because all data is stored remotely and only occasionally accessed locally, the confidentiality of data is crucial to cloud service providers. As is common knowledge, no cloud service provider currently offers data privacy through encryption and message digests to enable data authorisation. almost all businesses An untrusted user can query data files of interest by sending encrypted keywords as a search query to the cloud server. Try to search the data in a secure manner over encrypted cloud data. In this dishonest cloud environment, the returned query results may occasionally be correct, incorrect, or partial. As everyone is aware, cloud servers today nearly actively withhold some qualified results in order to conserve computational resources and communication overhead. In this research, we presented and analysed a safe, practical, and fine-grained query results verification mechanism, by which the query user, given an encrypted query results set, not only can confirm the integrity of each data file, but also determines the overall number of qualifying data files, which are not returned if the set is not finished before the decryption procedure. This served as our primary inspiration for creating a brand-new secure verification object for encrypted cloud storage. Here, the short signature key is created using the message digest method MD5, which is also used to confirm the data's authenticity. We tested our proposed model in a variety of ways, and the results demonstrate that it is a useful and effective system
Read full abstract