Skip to main content
Erschienen in: Wireless Personal Communications 3/2022

08.01.2022

An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud

verfasst von: K. L. Neela, V. Kavitha

Erschienen in: Wireless Personal Communications | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Cloud Environment provides storage for files as well as sharing services for disseminated clients. This technology helps users in the cloud to outsource their data and get good quality services from the cloud. Often, Data Integrity is a serious issue in Cloud Storage because the service provider is a semi-trusted one. Consequently, a self-determining auditing service is essential to check data integrity. In this paper, we developed a secure Cloud Storage environment without a third-party system and proposed an Improved Rivest-Shamir-Adleman Encryption Algorithm (IREA) along with the Flexible Capacity Cuckoo Filter (FCCF) auditing technique without Third Party Auditing. In this proposed system, the data owner encrypts the data using Improved RSA and stores it in the Cloud Service, and users alone can decrypt the data with the knowledge of the data owner. Furthermore, the FCCF ensures the integrity of the verification and secure data transactions can be provided by using the Two Level Quick Response (2LQR) code. The experimental results validate that the proposed IREA-FCCF with the 2LQR technique for data security in a CE has less time compared to that of the existing schemes in terms of encryption time, decryption time, signature generation, signature verification, and cost of the dynamic records.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Garg, N., Bawa, S., & Kumar, N. (2020). An efficient data integrity auditing protocol for cloud computing. Future Generation Computer Systems., 1(109), 306–316.CrossRef Garg, N., Bawa, S., & Kumar, N. (2020). An efficient data integrity auditing protocol for cloud computing. Future Generation Computer Systems., 1(109), 306–316.CrossRef
2.
Zurück zum Zitat Chinnasamy, P., Padmavathi, S., Swathy, R., & Rakesh, S. (2021). Efficient data security using hybrid cryptography on cloud computing. In G. Ranganathan, J. Chen, & Á. Rocha (Eds.), InInventive communication and computational technologies (pp. 537–547). Springer.CrossRef Chinnasamy, P., Padmavathi, S., Swathy, R., & Rakesh, S. (2021). Efficient data security using hybrid cryptography on cloud computing. In G. Ranganathan, J. Chen, & Á. Rocha (Eds.), InInventive communication and computational technologies (pp. 537–547). Springer.CrossRef
3.
Zurück zum Zitat Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218–226.CrossRef Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218–226.CrossRef
4.
Zurück zum Zitat Wei, P., Wang, D., Zhao, Y., Tyagi, S. K., & Kumar, N. (2020). Blockchain data-based cloud data integrity protection mechanism. Future Generation Computer Systems., 1(102), 902–911.CrossRef Wei, P., Wang, D., Zhao, Y., Tyagi, S. K., & Kumar, N. (2020). Blockchain data-based cloud data integrity protection mechanism. Future Generation Computer Systems., 1(102), 902–911.CrossRef
5.
Zurück zum Zitat Malik, A., & Om, H. (2018). Cloud computing and internet of things integration: architecture, applications, issues, and challenges. In W. Rivera (Ed.), Sustainable cloud and energy services (pp. 1–24). Springer International Publishing. Malik, A., & Om, H. (2018). Cloud computing and internet of things integration: architecture, applications, issues, and challenges. In W. Rivera (Ed.), Sustainable cloud and energy services (pp. 1–24). Springer International Publishing.
6.
Zurück zum Zitat Cheng, L., van Dongen, B. F., & van der Aalst, W. M. (2019). Scalable discovery of hybrid process models in a cloud computing environment. IEEE Transactions on Services Computing, 13(2), 368–380.CrossRef Cheng, L., van Dongen, B. F., & van der Aalst, W. M. (2019). Scalable discovery of hybrid process models in a cloud computing environment. IEEE Transactions on Services Computing, 13(2), 368–380.CrossRef
7.
Zurück zum Zitat Zhou, L., Li, X., Yeh, K. H., Su, C., & Chiu, W. (2019). Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Generation Computer Systems, 91, 244–251.CrossRef Zhou, L., Li, X., Yeh, K. H., Su, C., & Chiu, W. (2019). Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Generation Computer Systems, 91, 244–251.CrossRef
8.
Zurück zum Zitat Amin, R., Kumar, N., Biswas, G. P., Iqbal, R., & Chang, V. (2018). A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Generation Computer Systems, 78, 1005–1019.CrossRef Amin, R., Kumar, N., Biswas, G. P., Iqbal, R., & Chang, V. (2018). A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Generation Computer Systems, 78, 1005–1019.CrossRef
9.
Zurück zum Zitat Ghallab, A., Saif, M. H., Mohsen, A. (2021). Data integrity and security in distributed cloud computing—a review. In: Proceedings of international conference on recent trends in machine learning, IOT, smart cities and applications 2021 (pp. 767–784). Springer. Ghallab, A., Saif, M. H., Mohsen, A. (2021). Data integrity and security in distributed cloud computing—a review. In: Proceedings of international conference on recent trends in machine learning, IOT, smart cities and applications 2021 (pp. 767–784). Springer.
10.
Zurück zum Zitat Megouache, L., Zitouni, A., & Djoudi, M. (2020). Ensuring user authentication and data integrity in multi-cloud environment. Human-Centric Computing and Information Sciences, 10(1), 1–20.CrossRef Megouache, L., Zitouni, A., & Djoudi, M. (2020). Ensuring user authentication and data integrity in multi-cloud environment. Human-Centric Computing and Information Sciences, 10(1), 1–20.CrossRef
11.
Zurück zum Zitat Wang, Y., Miao, M., Shen, J., & Wang, J. (2019). Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Computing, 23(6), 2101–2112.CrossRef Wang, Y., Miao, M., Shen, J., & Wang, J. (2019). Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Computing, 23(6), 2101–2112.CrossRef
12.
Zurück zum Zitat Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020). Towards DNA based data security in the cloud computing environment. Computer Communications, 151, 539–547.CrossRef Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020). Towards DNA based data security in the cloud computing environment. Computer Communications, 151, 539–547.CrossRef
13.
Zurück zum Zitat Tahir, M., Sardaraz, M., Mehmood, Z., & Muhammad, S. (2021). CryptoGA: A cryptosystem based on genetic algorithm for cloud data security. Cluster Computing, 24(2), 739–752.CrossRef Tahir, M., Sardaraz, M., Mehmood, Z., & Muhammad, S. (2021). CryptoGA: A cryptosystem based on genetic algorithm for cloud data security. Cluster Computing, 24(2), 739–752.CrossRef
14.
Zurück zum Zitat Akande, N. O., Abikoye, C. O., Adebiyi, M. O., Kayode, A. A., Adegun, A. A., & Ogundokun, R. O. (2019). Electronic medical information encryption using modified blowfish algorithm. In: International conference on computational science and its applications, pp. 166–179. Akande, N. O., Abikoye, C. O., Adebiyi, M. O., Kayode, A. A., Adegun, A. A., & Ogundokun, R. O. (2019). Electronic medical information encryption using modified blowfish algorithm. In: International conference on computational science and its applications, pp. 166–179.
16.
Zurück zum Zitat Prakash, R., Chithaluru, P., Sharma, D., Srikanth, P. (2019). Implementation of trapdoor functionality to two-layer encryption and decryption by using RSA-AES cryptography algorithms. In: Nanoelectronics, circuits and communication systems, pp. 89-95. Prakash, R., Chithaluru, P., Sharma, D., Srikanth, P. (2019). Implementation of trapdoor functionality to two-layer encryption and decryption by using RSA-AES cryptography algorithms. In: Nanoelectronics, circuits and communication systems, pp. 89-95.
17.
Zurück zum Zitat Xiang, T., Li, X., Chen, F., Yang, Y., & Zhang, S. (2018). Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud. Journal of Parallel and Distributed Computing, 112, 97–107.CrossRef Xiang, T., Li, X., Chen, F., Yang, Y., & Zhang, S. (2018). Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud. Journal of Parallel and Distributed Computing, 112, 97–107.CrossRef
18.
Zurück zum Zitat Zhao, Q., Chen, S., Liu, Z., Baker, T., & Zhang, Y. (2020). Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing & Management, 57(6), 102355.CrossRef Zhao, Q., Chen, S., Liu, Z., Baker, T., & Zhang, Y. (2020). Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing & Management, 57(6), 102355.CrossRef
19.
Zurück zum Zitat Kumar, S., Karnani, G., Gaur, MS., Mishra, A. (2021). Cloud security using hybrid cryptography algorithms. In: 2021 2nd International conference on intelligent engineering and management (ICIEM) 2021 Apr 28 (pp. 599–604). IEEE. Kumar, S., Karnani, G., Gaur, MS., Mishra, A. (2021). Cloud security using hybrid cryptography algorithms. In: 2021 2nd International conference on intelligent engineering and management (ICIEM) 2021 Apr 28 (pp. 599–604). IEEE.
20.
Zurück zum Zitat Dhamodaran, M., Punarselvam, E., Varshan, S. D., Kumar, P. D., Saravanan, C., Prathap, K. (2021). Security and privacy of sensitive data in cloud computing using RSA. International Journal of Scientific Research in Science and Technology, 657–661. Dhamodaran, M., Punarselvam, E., Varshan, S. D., Kumar, P. D., Saravanan, C., Prathap, K. (2021). Security and privacy of sensitive data in cloud computing using RSA. International Journal of Scientific Research in Science and Technology, 657–661.
21.
Zurück zum Zitat Abid, R., Iwendi, C., Javed, A. R., Rizwan, M., Jalil, Z., Anajemba, J. H., & Biamba, C. (2021). An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Personal and Ubiquitous Computing., 1, 1–4. Abid, R., Iwendi, C., Javed, A. R., Rizwan, M., Jalil, Z., Anajemba, J. H., & Biamba, C. (2021). An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Personal and Ubiquitous Computing., 1, 1–4.
22.
Zurück zum Zitat Goyal, V., & Kant, C. (2018). An effective hybrid encryption algorithm for ensuring cloud data security. In V. B. Aggarwal, V. Bhatnagar, & D. K. Mishra (Eds.), Big data analytics (pp. 195–210). Springer.CrossRef Goyal, V., & Kant, C. (2018). An effective hybrid encryption algorithm for ensuring cloud data security. In V. B. Aggarwal, V. Bhatnagar, & D. K. Mishra (Eds.), Big data analytics (pp. 195–210). Springer.CrossRef
23.
Zurück zum Zitat Lee, B. H., Dewi, E. K., & Wajdi, M. F. (2018). Data security in cloud computing using AES under HEROKU cloud. In: 2018 27th wireless and optical communication conference (WOCC), pp. 1–5. Lee, B. H., Dewi, E. K., & Wajdi, M. F. (2018). Data security in cloud computing using AES under HEROKU cloud. In: 2018 27th wireless and optical communication conference (WOCC), pp. 1–5.
24.
Zurück zum Zitat Yang, Y., Chen, X., Chen, H., & Du, X. (2018). Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access, 6, 18009–18021.CrossRef Yang, Y., Chen, X., Chen, H., & Du, X. (2018). Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access, 6, 18009–18021.CrossRef
25.
Zurück zum Zitat Li, J., Chen, N., & Zhang, Y. (2019). Extended file hierarchy access control scheme with attribute based encryption in cloud computing. IEEE Transactions on Emerging Topics in Computing. Li, J., Chen, N., & Zhang, Y. (2019). Extended file hierarchy access control scheme with attribute based encryption in cloud computing. IEEE Transactions on Emerging Topics in Computing.
26.
Zurück zum Zitat Sharma, G., & Kalra, S. (2018). Identity based secure authentication scheme based on quantum key distribution for cloud computing. Peer-to-Peer networking and applications, 11(2), 220–234.CrossRef Sharma, G., & Kalra, S. (2018). Identity based secure authentication scheme based on quantum key distribution for cloud computing. Peer-to-Peer networking and applications, 11(2), 220–234.CrossRef
27.
Zurück zum Zitat Wu, L., Chen, B., Zeadally, S., & He, D. (2018). An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Computing, 22(23), 7685–7696.CrossRef Wu, L., Chen, B., Zeadally, S., & He, D. (2018). An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Computing, 22(23), 7685–7696.CrossRef
28.
Zurück zum Zitat Sharma, S., Singla, K., Rathee, G., & Saini, H. (2020). A hybrid cryptographic technique for file storage mechanism over cloud. In: First international conference on sustainable technologies for computational intelligence (pp. 241–256). Sharma, S., Singla, K., Rathee, G., & Saini, H. (2020). A hybrid cryptographic technique for file storage mechanism over cloud. In: First international conference on sustainable technologies for computational intelligence (pp. 241–256).
29.
Zurück zum Zitat Khedr, W. I., Khater, H. M., & Mohamed, E. R. (2019). Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage. IEEE Access, 7, 65635–65651.CrossRef Khedr, W. I., Khater, H. M., & Mohamed, E. R. (2019). Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage. IEEE Access, 7, 65635–65651.CrossRef
30.
Zurück zum Zitat Yu, Y., Li, Y., Yang, B., Susilo, W., Yang, G., & Bai, J. (2017). Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Transactions on Emerging Topics in Computing, 8(2), 377–390.CrossRef Yu, Y., Li, Y., Yang, B., Susilo, W., Yang, G., & Bai, J. (2017). Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Transactions on Emerging Topics in Computing, 8(2), 377–390.CrossRef
31.
Zurück zum Zitat Li, Y., Yu, Y., Chen, R., Du, X., & Guizani, M. (2020). integritychain: Provable data possession for decentralized storage. IEEE Journal on Selected Areas in Communications, 38(6), 1205–1217.CrossRef Li, Y., Yu, Y., Chen, R., Du, X., & Guizani, M. (2020). integritychain: Provable data possession for decentralized storage. IEEE Journal on Selected Areas in Communications, 38(6), 1205–1217.CrossRef
Metadaten
Titel
An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud
verfasst von
K. L. Neela
V. Kavitha
Publikationsdatum
08.01.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09248-8

Weitere Artikel der Ausgabe 3/2022

Wireless Personal Communications 3/2022 Zur Ausgabe

Neuer Inhalt