Hiindex LOGO

Research Article

Effectual Data Integrity Checking Technique Based On Number Theory


Author(s): V.Hema , M.GanagaDurga,G.Yogeswari
Affiliation: Research Scholar, Bharathiar University, Coimbatore
Year of Publication: 2015
Source: International Journal of Computing Algorithm
     
×

Scholarly Article Identity Link


HTML:


File:


Citation: V.Hema, M.GanagaDurga,G.Yogeswari. "Effectual Data Integrity Checking Technique Based On Number Theory." International Journal of Computing Algorithm 4.1 (2015): 33-36.

Abstract:
Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.


Keywords Cloud Computing, Data Integrity, Service Level Agreements, Cloud Archive, Third Party Auditor


  • BibTex
  • Reference
  • XML
  • JSON
  • Dublin Core
  • CSL

@article{Eff1587433, author = {V.Hema,M.GanagaDurga,G.Yogeswari}, title = {Effectual Data Integrity Checking Technique Based On Number Theory}, journal={International Journal of Computing Algorithm}, volume={4}, issue={1}, issn = {2278-2397}, year = {2015}, publisher = {Scholarly Citation Index Analytics-SCIA}

  • [1] Kaufman, Lori M. "Data security in the world of cloud computing." Security & Privacy, IEEE 7.4 2009: 61-64.
  • [2] Sravan Kumar, R., and AshutoshSaxena. "Data integrity proofs in cloud storage." Communication Systems and Networks COMSNETS, 201.1.
  • [3] Catteddu, Daniele, and Giles Hogben. "Cloud computing risk assessment."European Network and Information Security Agency ENISA 2009.Zissis, Dimitrios, and DimitriosLekkas. "Addressing cloud computing security issues." Future Generation Computer Systems 28.3 2012: 583-592.I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  • [4] Popovic, Kresimir, and ZeljkoHocenski. "Cloud computing security issues and challenges." MIPRO, 2010 proceedings of the 33rd international convention. IEEE, 2010.
  • [5] Desale, Mrs Vrushali R., and Pradeep K. Deshmukh. "Multi Client Support Third Party Auditor TPA for Cloud Data Integrity and Security." International Journal3.6 2013.
  • [6] M. Young, The Technical Writers Handbook. Mill Valley, CA: University Science, 1989. Ryan, Mark D. "Cloud computing security: The scientific challenge, and a survey of solutions." Journal of Systems and Software 2013.
  • [7] Kalpana, Parsi, and SudhaSingaraju. "Data Security in Cloud Computing using RSA Algorithm." IJRCCT 1.4 2012: 143-146.
  • [8] Luo, Wenjun, and GuojingBai. "Ensuring the data integrity in cloud data storage." Cloud Computing and Intelligence Systems CCIS, 2011 IEEE International Conference on. IEEE, 2011.
  • [9] Wang, Qian, et al. "Enabling public auditability and data dynamics for storage security in cloud computing." Parallel and Distributed Systems, IEEE Transactions on 22.5 2011: 847-859.
  • [10] Shinde, G. N., and H. S. Fadewar. "Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem." ICCES: International Conference on Computational & Experimental Engineering and Sciences. Vol. 5. No. 4. 2008.
  • <?xml version='1.0' encoding='UTF-8'?> <record> <language>eng</language> <journalTitle>International Journal of Computing Algorithm</journalTitle> <eissn>2278-2397 </eissn> <publicationDate>2015</publicationDate> <volume>4</volume> <issue>1</issue> <startPage>33</startPage> <endPage>36</endPage> <documentType>article</documentType> <title language='eng'>Effectual Data Integrity Checking Technique Based On Number Theory</title> <authors> <author> <name>V.Hema</name> </author> </authors> <abstract language='eng'>Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.</abstract> <fullTextUrl format='pdf'>http://www.hindex.org/2015/p874.pdf</fullTextUrl> <keywords language='eng'> <keyword>Cloud Computing, Data Integrity, Service Level Agreements, Cloud Archive, Third Party Auditor</keyword> </keywords> </record>

    { "@context":"http://schema.org", "@type":"publication-article","identifier":"http://www.hindex.org/2015/article.php?page=874", "name":"Effectual Data Integrity Checking Technique Based On Number Theory", "author":[{"name":"V.Hema "}], "datePublished":"2015", "description":"Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.", "keywords":["Cloud Computing, Data Integrity, Service Level Agreements, Cloud Archive, Third Party Auditor"], "schemaVersion":"https://schema.org/version/3.3", "includedInDataCatalog":{ "@type":"DataCatalog", "name":"Scholarly Citation Index Analytics-SCIA", "url":"http://hindex.org"}, "publisher":{"@type":"Organization", "name":"Scientific Communications Research Academy" } }

    <?xml version='1.0' encoding='utf-8'?> <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"> <dc:contributor>M.GanagaDurga</dc:contributor> <dc:contributor>G.Yogeswari</dc:contributor> <dc:contributor></dc:contributor> <dc:creator>V.Hema</dc:creator> <dc:date>2015</dc:date> <dc:description>Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.</dc:description> <dc:identifier>2015SCIA316F0874</dc:identifier> <dc:language>eng</dc:language> <dc:title>Effectual Data Integrity Checking Technique Based On Number Theory</dc:title> <dc:type>publication-article</dc:type> </oai_dc:dc>

    { "identifier": "2015SCIA316F0874", "abstract": "Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.", "author": [ { "family": "V.Hema,M.GanagaDurga,G.Yogeswari" } ], "id": "874", "issued": { "date-parts": [ [ 2015 ] ] }, "language": "eng", "publisher": "Scholarly Citation Index Analytics-SCIA", "title": " Effectual Data Integrity Checking Technique Based On Number Theory", "type": "publication-article", "version": "3" }