Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage

Neenu Garg, Anushka Nehra, Mohamed Baza, Neeraj Kumar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Cloud computing is a computing facility which allows its clients to outsource their information on distant cloud based servers without having the pressure of maintaining it. Of several remote data storage issues, data integrity preservation problem has gained much attention of researchers all over the world. Numerous research work has been done by researchers all over the world in the field of data integrity audit in cloud computing. Proposed work is an efficient and stable data integrity verification scheme based on Schnorr signatures. In Schnorr signatures, the signature verification equation is linear and also batch verification of several blocks is possible. Most existing schemes are based on Boneh Lynn and Shacham (BLS) and RSA signature schemes. However, in contrast with existing schemes, the proposed scheme is highly efficient and safe and pays lower verification computation costs proven experimentally in this paper.
Original languageEnglish
Title of host publication2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)
PublisherInstitute of Electrical and Electronics Engineers
Pages1-6
Number of pages6
ISBN (Print)9781665497350
DOIs
Publication statusPublished - 17 Mar 2023
Event2023 IEEE 20th Consumer Communications & Networking Conference (CCNC) - Las Vegas, NV, USA
Duration: 8 Jan 202311 Jan 2023

Publication series

Name
ISSN (Print)2331-9852
ISSN (Electronic)2331-9860

Conference

Conference2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)
Period8/01/2311/01/23

Keywords / Materials (for Non-textual outputs)

  • cloud computing
  • handwriting recognition
  • costs
  • data integrity
  • memory
  • maintenance engineering
  • computational efficiency

Fingerprint

Dive into the research topics of 'Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage'. Together they form a unique fingerprint.

Cite this