
Achieving Authentication of Remotely Stored Data
Author(s) -
Vidyullata Devmane,
B. K. Lande,
Jyoti Joglekar,
Dr.Hemant Kothari
Publication year - 2020
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.b7435.019320
Subject(s) - computer science , correctness , cloud storage , hash function , authentication (law) , encryption , computer security , homomorphic encryption , cryptography , cloud computing , database , computer network , operating system , algorithm
Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.