Achieving Authentication of Remotely Stored Data

Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of som...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of innovative technology and exploring engineering 2020-01, Vol.9 (3), p.882-884
Hauptverfasser: Devmane, Vidyullata, Lande, Dr. B.K., Joglekar, Dr. Jyoti, Kothari, Dr.Hemant
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 884
container_issue 3
container_start_page 882
container_title International journal of innovative technology and exploring engineering
container_volume 9
creator Devmane, Vidyullata
Lande, Dr. B.K.
Joglekar, Dr. Jyoti
Kothari, Dr.Hemant
description Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.
doi_str_mv 10.35940/ijitee.B7435.019320
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_35940_ijitee_B7435_019320</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_35940_ijitee_B7435_019320</sourcerecordid><originalsourceid>FETCH-LOGICAL-c910-80e8855f111e2a33d6817177d6a24dbd1f0b3fc878b79f58cce8b7f740fefaf73</originalsourceid><addsrcrecordid>eNpNz81Kw0AUhuFBFCy1d-AiN5B6TmYmM1nG-lOhIGj3w2Ryjp3SJpKMQu9eaVy4-t7VB48QtwhLqSsFd3EfE9Hy3iipl4CVLOBCzIrC2FyC0Zf_-losxnEPACgV2rKaCajDLtJ37D6y-ivtqEsx-BT7Lus5e6Njn-hwyt5TP1CbPfjkb8QV-8NIi7-di-3T43a1zjevzy-repOHCiG3QNZqzYhIhZeyLS0aNKYtfaHapkWGRnKwxjamYm1DoN9io4CJPRs5F2q6DUM_jgOx-xzi0Q8nh-DObje53dntJrf8Ab9wTNI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Achieving Authentication of Remotely Stored Data</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Devmane, Vidyullata ; Lande, Dr. B.K. ; Joglekar, Dr. Jyoti ; Kothari, Dr.Hemant</creator><creatorcontrib>Devmane, Vidyullata ; Lande, Dr. B.K. ; Joglekar, Dr. Jyoti ; Kothari, Dr.Hemant ; Professor in Electronics Department, Datta Meghe College of Engineering, Airoli, Navi Mumbai.India ; Professor at PAHERU,Udaipur, Rajasthan, India ; PhD Scholar of Computer Engineering Department, PAHERU Udaipur, Rajasthan, India ; department, Professor in Computer Engineering Departement,K.J.Somaiya College of Engineering,Mumbai, India</creatorcontrib><description>Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.</description><identifier>ISSN: 2278-3075</identifier><identifier>EISSN: 2278-3075</identifier><identifier>DOI: 10.35940/ijitee.B7435.019320</identifier><language>eng</language><ispartof>International journal of innovative technology and exploring engineering, 2020-01, Vol.9 (3), p.882-884</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Devmane, Vidyullata</creatorcontrib><creatorcontrib>Lande, Dr. B.K.</creatorcontrib><creatorcontrib>Joglekar, Dr. Jyoti</creatorcontrib><creatorcontrib>Kothari, Dr.Hemant</creatorcontrib><creatorcontrib>Professor in Electronics Department, Datta Meghe College of Engineering, Airoli, Navi Mumbai.India</creatorcontrib><creatorcontrib>Professor at PAHERU,Udaipur, Rajasthan, India</creatorcontrib><creatorcontrib>PhD Scholar of Computer Engineering Department, PAHERU Udaipur, Rajasthan, India</creatorcontrib><creatorcontrib>department, Professor in Computer Engineering Departement,K.J.Somaiya College of Engineering,Mumbai, India</creatorcontrib><title>Achieving Authentication of Remotely Stored Data</title><title>International journal of innovative technology and exploring engineering</title><description>Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.</description><issn>2278-3075</issn><issn>2278-3075</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNpNz81Kw0AUhuFBFCy1d-AiN5B6TmYmM1nG-lOhIGj3w2Ryjp3SJpKMQu9eaVy4-t7VB48QtwhLqSsFd3EfE9Hy3iipl4CVLOBCzIrC2FyC0Zf_-losxnEPACgV2rKaCajDLtJ37D6y-ivtqEsx-BT7Lus5e6Njn-hwyt5TP1CbPfjkb8QV-8NIi7-di-3T43a1zjevzy-repOHCiG3QNZqzYhIhZeyLS0aNKYtfaHapkWGRnKwxjamYm1DoN9io4CJPRs5F2q6DUM_jgOx-xzi0Q8nh-DObje53dntJrf8Ab9wTNI</recordid><startdate>20200130</startdate><enddate>20200130</enddate><creator>Devmane, Vidyullata</creator><creator>Lande, Dr. B.K.</creator><creator>Joglekar, Dr. Jyoti</creator><creator>Kothari, Dr.Hemant</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20200130</creationdate><title>Achieving Authentication of Remotely Stored Data</title><author>Devmane, Vidyullata ; Lande, Dr. B.K. ; Joglekar, Dr. Jyoti ; Kothari, Dr.Hemant</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c910-80e8855f111e2a33d6817177d6a24dbd1f0b3fc878b79f58cce8b7f740fefaf73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Devmane, Vidyullata</creatorcontrib><creatorcontrib>Lande, Dr. B.K.</creatorcontrib><creatorcontrib>Joglekar, Dr. Jyoti</creatorcontrib><creatorcontrib>Kothari, Dr.Hemant</creatorcontrib><creatorcontrib>Professor in Electronics Department, Datta Meghe College of Engineering, Airoli, Navi Mumbai.India</creatorcontrib><creatorcontrib>Professor at PAHERU,Udaipur, Rajasthan, India</creatorcontrib><creatorcontrib>PhD Scholar of Computer Engineering Department, PAHERU Udaipur, Rajasthan, India</creatorcontrib><creatorcontrib>department, Professor in Computer Engineering Departement,K.J.Somaiya College of Engineering,Mumbai, India</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of innovative technology and exploring engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Devmane, Vidyullata</au><au>Lande, Dr. B.K.</au><au>Joglekar, Dr. Jyoti</au><au>Kothari, Dr.Hemant</au><aucorp>Professor in Electronics Department, Datta Meghe College of Engineering, Airoli, Navi Mumbai.India</aucorp><aucorp>Professor at PAHERU,Udaipur, Rajasthan, India</aucorp><aucorp>PhD Scholar of Computer Engineering Department, PAHERU Udaipur, Rajasthan, India</aucorp><aucorp>department, Professor in Computer Engineering Departement,K.J.Somaiya College of Engineering,Mumbai, India</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Achieving Authentication of Remotely Stored Data</atitle><jtitle>International journal of innovative technology and exploring engineering</jtitle><date>2020-01-30</date><risdate>2020</risdate><volume>9</volume><issue>3</issue><spage>882</spage><epage>884</epage><pages>882-884</pages><issn>2278-3075</issn><eissn>2278-3075</eissn><abstract>Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.</abstract><doi>10.35940/ijitee.B7435.019320</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2278-3075
ispartof International journal of innovative technology and exploring engineering, 2020-01, Vol.9 (3), p.882-884
issn 2278-3075
2278-3075
language eng
recordid cdi_crossref_primary_10_35940_ijitee_B7435_019320
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
title Achieving Authentication of Remotely Stored Data
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T13%3A46%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Achieving%20Authentication%20of%20Remotely%20Stored%20Data&rft.jtitle=International%20journal%20of%20innovative%20technology%20and%20exploring%20engineering&rft.au=Devmane,%20Vidyullata&rft.aucorp=Professor%20in%20Electronics%20Department,%20Datta%20Meghe%20College%20of%20Engineering,%20Airoli,%20Navi%20Mumbai.India&rft.date=2020-01-30&rft.volume=9&rft.issue=3&rft.spage=882&rft.epage=884&rft.pages=882-884&rft.issn=2278-3075&rft.eissn=2278-3075&rft_id=info:doi/10.35940/ijitee.B7435.019320&rft_dat=%3Ccrossref%3E10_35940_ijitee_B7435_019320%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true