Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
نویسندگان
چکیده
Nowadays, numerous applications are associated with cloud and user data gets collected globally stored in units. In addition to shared storage, computing technique offers multiple advantages for the through different distribution designs like hybrid cloud, public community private cloud. Though cloud-based solutions highly convenient users, it also brings a challenge i.e., security of shared. Hence, current research paper, blockchain integrity authentication is developed an efficient secure operation process. Blockchain technology utilized this study enable which not only empowers but avoids threats attacks. Additionally, limit unwanted access storage unit. The major objective projected empower environment. To improve proposed process, cuckoo filter Merkle Hash Tree (MHT) utilized. methodology was validated using few performance metrics such as processing time, uploading downloading consensus waiting initialization overhead. method compared conventional techniques outcomes establish supremacy method.
منابع مشابه
Secure Mutual Authentication for Cloud Environment
Cloud computing is a service oriented technology which provides various services to users which vary from software to hardware. However, ensuring the security in cloud computing environments is one of the most challenging issues. In cloud, when two parties communicate with each other, mutual authentication is needed for secure communication. This paper proposes a secure mutual authentication mo...
متن کاملA Secure Hardware Based Multifarious Component Authentication Technique Using USB for Cloud Environment
-------------------------------------------------------------------ABSTRACT------------------------------------------------------------Authenticating users and establishing their identity is the first most part of any computer based application or website. This has to be the most significant point from the security aspect. With the emergence of cloud platforms and their services, our interactio...
متن کاملSecure Authentication of Cloud Data Mining API
Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multifold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure pr...
متن کاملCluster Enhanced Secure Authentication Scheme for Data Integrity in Manet
Mobile ad hoc networks (MANETs) consist of wireless mobile nodes that can dynamically and freely selforganize into arbitrary and temporary ad hoc network topologies. Due to high mobility of nodes, there exist frequent link breakages which lead to frequent path failures and route discoveries. In a route discovery, both cluster and broadcasting scheme is deployed, where a mobile node blindly rebr...
متن کاملImproving Security and Integrity of Data Storage in Cloud Computing By Using Homomorphic Authentication technique
as we seen that, today’s generation of IT has widely use the cloud computing services, that means in future cloud computing will important part of IT enterprise. In which the application software and databases are stored at centralized large data storage. Now in cloud data center, management of data & services may not be fully trustworthy. This new phenomenon brings many security challenges. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Intelligent Automation and Soft Computing
سال: 2023
ISSN: ['2326-005X', '1079-8587']
DOI: https://doi.org/10.32604/iasc.2023.032942