An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing

INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2021(2022)

Cited 0|Views2
No score
Abstract
Cloud computing is growing in quality thanks to its ability to supply dynamically ascendible resources provisioned as services no matter user or location device. However, moving knowledge to the cloud means the management of the info is a lot of within the hands of the cloud supplier instead of the info owner. Despite the advantages that the cloud presents, cloud computing technology is moon-faced with a range of legal and technological challenges. Security and privacy are amongst the most important challenges as known. There should be certain type of system to guarantee the integrity of the records. The current Cloud safety model is sited on the interpretation that the client should trust the source. Guaranteeing documents integrity needs a promise of trust among the customer and the supplier. Numerous cryptographic methods have been developed and used to deliver improved safety for the sake of keeping integrity issues. We assume that our file (F) is divided into n shares. Poly1305 could be a cryptographically message authentication code (MAC). It is often wont to verify the info integrity and therefore the legitimacy of a message. Shamir Secret Sharing is used to split client file into n shares and these shares are further encrypted using poly1305. An Effective Integrity Verification Scheme (EIVS) based SSS and Poly-1305 is implemented and compared with SSS-AES. Entropy and Timing analysis of EIVS is done for short, long and larger text files.
More
Translated text
Key words
Shamir secret sharing, Effective integrity verification scheme, Advance encryption system, Message authentication code
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined