Enhancement in data security and integrity using minhash technique

نویسندگان

چکیده

Data <span>encryption process and key generation techniques protect sensitive data against any various attacks. This paper focuses on generating secured cipher keys to raise the level of security speed integrity checking by using MinHash function. The methodology is based applying cryptographic algorithms rivest-shamir-adleman (RSA) advanced encryption standard (AES) generate keys. These are used in encryption/decryption utilizing Pearson Hash techniques. divided into shingles that function integers public private technique check comparing sender’s receiver’s encrypted digest. experimental results show RSA AES have less time compared normal hash functions 17.35% 43.93%, respectively. between two large sets improved 100% original algorithm terms completion time, 77% for small/medium set memory utilization.</span>

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Enhancement and Data Integrity Checking In Multi- Cloud Storage

Generally the cloud server act as a container which contains data or information. Providing Security in cloud is becoming a difficult task now days. Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their...

متن کامل

Improving Security and Integrity of Data Storage in Cloud Computing By Using Homomorphic Authentication technique

as we seen that, today’s generation of IT has widely use the cloud computing services, that means in future cloud computing will important part of IT enterprise. In which the application software and databases are stored at centralized large data storage. Now in cloud data center, management of data & services may not be fully trustworthy. This new phenomenon brings many security challenges. Th...

متن کامل

pattern recognition in maintenance data using methodologies data minitng (cade study isfahan regional power electric company)

فعالیت های نگهداری و تعمیرات اطلاعاتی را تولید می کند که می تواند در تعیین زمان های بیکاری و ارایه یک برنامه زمان بندی شده یا تعیین هشدارهای خرابی به پرسنل نگهداری و تعمیرات کمک کند. وقتی که مقدار داده های تولید شده زیاد باشند، فهم بین متغیرها بسیار مشکل می شوند. این پایان نامه به کاربردی از داده کاوی برای کاوش پایگاه های داده چندبعدی در حوزه نگهداری و تعمیرات، برای پیدا کردن خرابی هایی که موجب...

15 صفحه اول

Data Integrity in Cloud Computing Security

Cloud computing requires comprehensive security solutions based upon many aspects of a large and loosely integrated system. The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Threats, vulnerabilities and risks for cloud computing are explained, and then, we have de...

متن کامل

Remote Data Integrity in Cloud Security Services

Cloud Structure delivers infrastructure, platform and software as a service which are made available in pay-as-you go model. Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Users interact with the cloud servers through Cloud Storage Providers (CSP) to access or retrieve the data. Users have no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2021

ISSN: ['2502-4752', '2502-4760']

DOI: https://doi.org/10.11591/ijeecs.v21.i3.pp1739-1750