Performance analysis of cloud data verification using MD5 and ECDSA method

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing enable the users to outsource and access data economically using storage as a service. In this storage model, the data owner doesnot have any control of the data once its stores on cloud server. Therefore, privacy and security of the data is a challenging issue in cloud computing. To provide the integrity of the outsourced data, we have proposed a lightweight data auditing technique such as MD5 and ECDSA signature method using third party auditor. The result analysis of the proposed method shows that, ECDSA has better security performance than the computation as compared to MD5 method for larger data size. The selection of the signature method depends on the priority of the data size and frequency of accessing.

Cite

CITATION STYLE

APA

Prakash, G. L., Prateek, M., & Singh, I. (2018). Performance analysis of cloud data verification using MD5 and ECDSA method. In Communications in Computer and Information Science (Vol. 799, pp. 616–628). Springer Verlag. https://doi.org/10.1007/978-981-10-8527-7_52

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free