DATA INTEGRITY VERIFICATION USING OPERATION RECORD TABLE IN CLOUD COMPUTING

Authors

  • Muralidhar Reddy Eedunuri
  • TSKS jyothirmayi
  • Y Pavan Kumar Gupta
  • B Sumalatha

Keywords:

SHA-256 algorithm, Hash Code for checking, RDPC, Operation Record Table.

Abstract

As crucial software in cloud computing, cloud garage offers consumer scalable, flexible and excessive first-rate statistics garage and computation offerings. A developing number of data owners pick to outsource information documents to the cloud. Because cloud garage servers aren't fully trustworthy, information owners need reliable approach to test the possession for his or her documents outsourced too far off cloud servers. To deal with this vital problem, a few faraway statistics ownership checking (RDPC) protocols were supplied. But many existing schemes have vulnerabilities in performance or facts dynamics. In this paper, we offer a new green RDPC protocol based totally on homomorphic hash function. The new scheme is provably relaxed towards forgery attack, replace attack and replay assault primarily based on an average security model. To guide facts dynamics, an operation file desk (ORT) is delivered to track operations on document blocks. We similarly deliver a brand new optimized implementation for the ORT which makes the cost of getting access to ORT almost constant. Moreover, we make the complete performance evaluation which suggests that our scheme has advantages in computation and verbal exchange costs. Information protection, from time to time shortened to InfoSec, is the exercise of stopping unauthorized get right of entry to, use, disclosure, disruption, modification, inspection, recording or destruction of facts. It is a general time period that may be used irrespective of the shape the information may take (e.g. Digital, bodily). Network protection consists of the rules and practices adopted to save you and monitor unauthorized get admission to, misuse, modification, or denial of a computer community and community-available resources. Network protection includes the authorization of get admission to information in a network, that's controlled by using the network administrator. Users choose or are assigned an ID and password or different authenticating facts that permits them get admission to statistics and packages inside their authority. Network protection covers a selection of laptop networks, both public and personal, which can be utilized in normal jobs; carrying out transactions and communications among groups,

government businesses and individuals. Networks may be non-public, along with inside a enterprise, and others which is probably open to public get entry to. Network safety is worried in companies, businesses, and other sorts of establishments. It does as its name explains: It secures the community, as well as protective and overseeing operations being performed. The maximum not unusual and easy manner of protecting a network aid is by assigning it a unique call and a corresponding password.

Downloads

Published

2023-11-23