Achieving Authentication of Remotely Stored Data

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.

Cite

CITATION STYLE

APA

Devmane*, V., Lande, Dr. B. K., … Kothari, Dr. H. (2020). Achieving Authentication of Remotely Stored Data. International Journal of Innovative Technology and Exploring Engineering, 9(3), 882–884. https://doi.org/10.35940/ijitee.b7435.019320

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free