Merkle Hellman knapsack cryptosystem based cloud auditing protocol

Citations of this article
Mendeley users who have this article in their library.
Get full text


The cloud environment provided the cloud storage services to allow the users for storing, managing and accessing their data through the internet. The user worried about the integrity of data because of their data can be modified by external hackers due to the limited control. The new auditing technology is required for allowing the user to use local storage without worrying about the integrity of the data. An independent entity called Third Party Auditor (TPA) is presented for auditing task rather than putting the burden of task to the user themselves. In our proposed work, the Cloud Auditor (CA) plays the role of monitoring the modifications done to the block by any external hacker if it happens; original data is recovered from its cache log. Every data that transacts between the storage, user and the CA are encrypted with Merkle Hellman Knapsack Cryptosystem based Cloud Auditing Protocol (MHKC-CAP) algorithm. Thus the proposed methodology outperforms the existing algorithms like Message Digest 5 (MD5) algorithm and Advanced Encryption Standard (AES) by means of auditing time around 13 milliseconds and accuracy in terms of False Positive Rate (FPR) and False Negative Rate (FNR) are around 0.67% and 0.5%.




Charles, A. (2019). Merkle Hellman knapsack cryptosystem based cloud auditing protocol. International Journal of Innovative Technology and Exploring Engineering, 8(10), 2168–2174.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free