Achieving Authentication of Remotely Stored Data
Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of som...
Gespeichert in:
Veröffentlicht in: | International journal of innovative technology and exploring engineering 2020-01, Vol.9 (3), p.882-884 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 884 |
---|---|
container_issue | 3 |
container_start_page | 882 |
container_title | International journal of innovative technology and exploring engineering |
container_volume | 9 |
creator | Devmane, Vidyullata Lande, Dr. B.K. Joglekar, Dr. Jyoti Kothari, Dr.Hemant |
description | Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity. |
doi_str_mv | 10.35940/ijitee.B7435.019320 |
format | Article |
fullrecord | <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_35940_ijitee_B7435_019320</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_35940_ijitee_B7435_019320</sourcerecordid><originalsourceid>FETCH-LOGICAL-c910-80e8855f111e2a33d6817177d6a24dbd1f0b3fc878b79f58cce8b7f740fefaf73</originalsourceid><addsrcrecordid>eNpNz81Kw0AUhuFBFCy1d-AiN5B6TmYmM1nG-lOhIGj3w2Ryjp3SJpKMQu9eaVy4-t7VB48QtwhLqSsFd3EfE9Hy3iipl4CVLOBCzIrC2FyC0Zf_-losxnEPACgV2rKaCajDLtJ37D6y-ivtqEsx-BT7Lus5e6Njn-hwyt5TP1CbPfjkb8QV-8NIi7-di-3T43a1zjevzy-repOHCiG3QNZqzYhIhZeyLS0aNKYtfaHapkWGRnKwxjamYm1DoN9io4CJPRs5F2q6DUM_jgOx-xzi0Q8nh-DObje53dntJrf8Ab9wTNI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Achieving Authentication of Remotely Stored Data</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Devmane, Vidyullata ; Lande, Dr. B.K. ; Joglekar, Dr. Jyoti ; Kothari, Dr.Hemant</creator><creatorcontrib>Devmane, Vidyullata ; Lande, Dr. B.K. ; Joglekar, Dr. Jyoti ; Kothari, Dr.Hemant ; Professor in Electronics Department, Datta Meghe College of Engineering, Airoli, Navi Mumbai.India ; Professor at PAHERU,Udaipur, Rajasthan, India ; PhD Scholar of Computer Engineering Department, PAHERU Udaipur, Rajasthan, India ; department, Professor in Computer Engineering Departement,K.J.Somaiya College of Engineering,Mumbai, India</creatorcontrib><description>Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.</description><identifier>ISSN: 2278-3075</identifier><identifier>EISSN: 2278-3075</identifier><identifier>DOI: 10.35940/ijitee.B7435.019320</identifier><language>eng</language><ispartof>International journal of innovative technology and exploring engineering, 2020-01, Vol.9 (3), p.882-884</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Devmane, Vidyullata</creatorcontrib><creatorcontrib>Lande, Dr. B.K.</creatorcontrib><creatorcontrib>Joglekar, Dr. Jyoti</creatorcontrib><creatorcontrib>Kothari, Dr.Hemant</creatorcontrib><creatorcontrib>Professor in Electronics Department, Datta Meghe College of Engineering, Airoli, Navi Mumbai.India</creatorcontrib><creatorcontrib>Professor at PAHERU,Udaipur, Rajasthan, India</creatorcontrib><creatorcontrib>PhD Scholar of Computer Engineering Department, PAHERU Udaipur, Rajasthan, India</creatorcontrib><creatorcontrib>department, Professor in Computer Engineering Departement,K.J.Somaiya College of Engineering,Mumbai, India</creatorcontrib><title>Achieving Authentication of Remotely Stored Data</title><title>International journal of innovative technology and exploring engineering</title><description>Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.</description><issn>2278-3075</issn><issn>2278-3075</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNpNz81Kw0AUhuFBFCy1d-AiN5B6TmYmM1nG-lOhIGj3w2Ryjp3SJpKMQu9eaVy4-t7VB48QtwhLqSsFd3EfE9Hy3iipl4CVLOBCzIrC2FyC0Zf_-losxnEPACgV2rKaCajDLtJ37D6y-ivtqEsx-BT7Lus5e6Njn-hwyt5TP1CbPfjkb8QV-8NIi7-di-3T43a1zjevzy-repOHCiG3QNZqzYhIhZeyLS0aNKYtfaHapkWGRnKwxjamYm1DoN9io4CJPRs5F2q6DUM_jgOx-xzi0Q8nh-DObje53dntJrf8Ab9wTNI</recordid><startdate>20200130</startdate><enddate>20200130</enddate><creator>Devmane, Vidyullata</creator><creator>Lande, Dr. B.K.</creator><creator>Joglekar, Dr. Jyoti</creator><creator>Kothari, Dr.Hemant</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20200130</creationdate><title>Achieving Authentication of Remotely Stored Data</title><author>Devmane, Vidyullata ; Lande, Dr. B.K. ; Joglekar, Dr. Jyoti ; Kothari, Dr.Hemant</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c910-80e8855f111e2a33d6817177d6a24dbd1f0b3fc878b79f58cce8b7f740fefaf73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Devmane, Vidyullata</creatorcontrib><creatorcontrib>Lande, Dr. B.K.</creatorcontrib><creatorcontrib>Joglekar, Dr. Jyoti</creatorcontrib><creatorcontrib>Kothari, Dr.Hemant</creatorcontrib><creatorcontrib>Professor in Electronics Department, Datta Meghe College of Engineering, Airoli, Navi Mumbai.India</creatorcontrib><creatorcontrib>Professor at PAHERU,Udaipur, Rajasthan, India</creatorcontrib><creatorcontrib>PhD Scholar of Computer Engineering Department, PAHERU Udaipur, Rajasthan, India</creatorcontrib><creatorcontrib>department, Professor in Computer Engineering Departement,K.J.Somaiya College of Engineering,Mumbai, India</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of innovative technology and exploring engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Devmane, Vidyullata</au><au>Lande, Dr. B.K.</au><au>Joglekar, Dr. Jyoti</au><au>Kothari, Dr.Hemant</au><aucorp>Professor in Electronics Department, Datta Meghe College of Engineering, Airoli, Navi Mumbai.India</aucorp><aucorp>Professor at PAHERU,Udaipur, Rajasthan, India</aucorp><aucorp>PhD Scholar of Computer Engineering Department, PAHERU Udaipur, Rajasthan, India</aucorp><aucorp>department, Professor in Computer Engineering Departement,K.J.Somaiya College of Engineering,Mumbai, India</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Achieving Authentication of Remotely Stored Data</atitle><jtitle>International journal of innovative technology and exploring engineering</jtitle><date>2020-01-30</date><risdate>2020</risdate><volume>9</volume><issue>3</issue><spage>882</spage><epage>884</epage><pages>882-884</pages><issn>2278-3075</issn><eissn>2278-3075</eissn><abstract>Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.</abstract><doi>10.35940/ijitee.B7435.019320</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2278-3075 |
ispartof | International journal of innovative technology and exploring engineering, 2020-01, Vol.9 (3), p.882-884 |
issn | 2278-3075 2278-3075 |
language | eng |
recordid | cdi_crossref_primary_10_35940_ijitee_B7435_019320 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
title | Achieving Authentication of Remotely Stored Data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T13%3A46%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Achieving%20Authentication%20of%20Remotely%20Stored%20Data&rft.jtitle=International%20journal%20of%20innovative%20technology%20and%20exploring%20engineering&rft.au=Devmane,%20Vidyullata&rft.aucorp=Professor%20in%20Electronics%20Department,%20Datta%20Meghe%20College%20of%20Engineering,%20Airoli,%20Navi%20Mumbai.India&rft.date=2020-01-30&rft.volume=9&rft.issue=3&rft.spage=882&rft.epage=884&rft.pages=882-884&rft.issn=2278-3075&rft.eissn=2278-3075&rft_id=info:doi/10.35940/ijitee.B7435.019320&rft_dat=%3Ccrossref%3E10_35940_ijitee_B7435_019320%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |