A modified Elliptic Curve Digital Signature Algorithm for Public Verifiability with Data dynamics in Cloud Computing
نویسندگان
چکیده
Cloud storage is considered to be the most critical factor in decision making for users as it largely scales down the infrastructure in terms of size, cost and design. Considering factors such as local storage cost, maintenance a single server model can support multiple users on a needed basis. This raises concerns for integrity verification i.e., assuring the correctness of the data stored available in cloud. The proposed auditing algorithm suggests and investigates digital signature for integrity verification. A Modified Version of Elliptic curve digital Signature Algorithm is proposed for auditing the task. The main focus of this study is to address problems such as privacy preserving, public auditing. In addition, the performance of the auditing task is optimized. Data dynamics have been modeled through various data operations such as block insertion, deletion and block modification. Extensive theoretical and experimental analysis presented in the paper shows that security, performance of the proposed algorithm are improved in terms of verification time of the auditing process.
منابع مشابه
Elliptic Curve Cryptography Digital Signature Algorithm For Privacy-Preserving Public Auditing For Shared Data In The Cloud
Cloud computing becomes one of the emerging technology on now a days to share and manage their data in organization , because of its forcefulness, small communication cost and everywhere environment. Privacy preservation concern in the cloud computing becomes arise several security challenges since information stored in the cloud data is easily outsourced anywhere at any time. To manage this pr...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملA Signcryption Scheme based on Elliptic Curve Cryptography
In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and encryption mechanisms can be combined to form a single logic...
متن کاملSurvey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
Numerous advancements in the Information Technology (IT) require the proper security policy for the data storage and transfer among the cloud. With the increase in size of the data, the time required to handle the huge-size data is more. An assurance of security in cloud computing suffers various issues. The evolution of cryptographic approaches addresses these limitations and provides the solu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCS
دوره 10 شماره
صفحات -
تاریخ انتشار 2014