{"title":"Effective privacy preserving in cloud computing using position aware Merkle tree model","authors":"Shruthi Gangadharaiah, Purohit Shrinivasacharya","doi":"10.11591/eei.v13i2.6636","DOIUrl":null,"url":null,"abstract":"In this research manuscript, a new protocol is proposed for predicting the available space in the cloud and verifying the security of stored data. The protocol is utilized for learning the available data, and based on this learning, the available storage space is identified, after which the cloud service providers allow for data storage. The Integrity verification separates the private and the public data, which avoids privacy issues. The integration of the private data is done with the help of cloud service providers with respect to the third-party auditing (TPA). Earlier, public key cryptography and bilinear map technologies have been combined by the researchers, but the computation time and costs were high. To secure the integrity of the data storage, the client should execute several computations. Therefore, this research suggests a reliable and effective method called position-aware Merkle tree (PMT), which is implemented for ensuring data integrity. The proposed system uses a PMT that enables the TPA to perform multiple auditing tasks with high efficiency, less computational cost and computation time. Simulation results clearly shows that the developed PMT method consumed 0.00459 milliseconds of computation time, which is limited when compared to the existing models.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"26 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Bulletin of Electrical Engineering and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11591/eei.v13i2.6636","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0
Abstract
In this research manuscript, a new protocol is proposed for predicting the available space in the cloud and verifying the security of stored data. The protocol is utilized for learning the available data, and based on this learning, the available storage space is identified, after which the cloud service providers allow for data storage. The Integrity verification separates the private and the public data, which avoids privacy issues. The integration of the private data is done with the help of cloud service providers with respect to the third-party auditing (TPA). Earlier, public key cryptography and bilinear map technologies have been combined by the researchers, but the computation time and costs were high. To secure the integrity of the data storage, the client should execute several computations. Therefore, this research suggests a reliable and effective method called position-aware Merkle tree (PMT), which is implemented for ensuring data integrity. The proposed system uses a PMT that enables the TPA to perform multiple auditing tasks with high efficiency, less computational cost and computation time. Simulation results clearly shows that the developed PMT method consumed 0.00459 milliseconds of computation time, which is limited when compared to the existing models.
期刊介绍:
Bulletin of Electrical Engineering and Informatics publishes original papers in the field of electrical, computer and informatics engineering which covers, but not limited to, the following scope: Computer Science, Computer Engineering and Informatics[...] Electronics[...] Electrical and Power Engineering[...] Telecommunication and Information Technology[...]Instrumentation and Control Engineering[...]