UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 8 Issue 1
January-2021
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2101144


Registration ID:
305063

Page Number

1148-1158

Share This Article


Jetir RMS

Title

Preserving Data Integrity with Optimal Authentication in Cloud Computing

Abstract

Cloud storage provides data storage and management service which is a cloud computing system. However, cloud storage also causes a series of security problems. When using cloud storage, users do not actually control the physical storage of their data and it results in the separation of ownership and management of data. Here, the main challenge is that the client has to update his secret keys in every time period, which may inevitably bring in new local burdens to the client. In this work, we focus on how to make the key updates as transparent as possible for the client and propose a new algorithm called cloud storage with Optimal Key Authentication. In this proposed algorithm, the Two Factor Authentication (2FA) is leveraged in many existing public auditing designs, which play the role of authorized party in our case, and make it in charge of both the storage auditing and the secure key updates. In our design, 2FA only needs to hold an encrypted version of the client secret key while doing all these burdensome tasks on behalf of the client. The client only needs to download the encrypted secret key from the 2FA when uploading new files to cloud. The proposed Temporal Reed Hash-Solomon algorithm is designed to divide data into different parts with completely efficient encoding and decoding. It ensures an effective protection of data integrity. Thus, our proposed schemes are efficient from the experiment results.

Key Words

Cloud Computing, Data Integrity, Data Storage

Cite This Article

"Preserving Data Integrity with Optimal Authentication in Cloud Computing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.8, Issue 1, page no.1148-1158, January-2021, Available :http://www.jetir.org/papers/JETIR2101144.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Preserving Data Integrity with Optimal Authentication in Cloud Computing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.8, Issue 1, page no. pp1148-1158, January-2021, Available at : http://www.jetir.org/papers/JETIR2101144.pdf

Publication Details

Published Paper ID: JETIR2101144
Registration ID: 305063
Published In: Volume 8 | Issue 1 | Year January-2021
DOI (Digital Object Identifier):
Page No: 1148-1158
Country: Chennai, Tamil Nadu, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003052

Print This Page

Current Call For Paper

Jetir RMS