{"title":"基于ECMRSA算法的云数据外包完整性监控","authors":"D. V. Thang, N. D. Pham","doi":"10.51456/IJEIT.2020.V10I05.004","DOIUrl":null,"url":null,"abstract":"With its on-demand technology, cloud computing has advanced to allow vast volumes of data to be interchanged via cloud services. Scalable cloud services that store confidential data on cloud storage servers are therefore critical to the complex management of a number of problem fields: security, privacy, data sharing and cloud server integrity. In addition, in this expanded environment, validity and control of access to data should be retained. One of the core principles for cloud encryption is abe. An interest in this research is the auditing of data or integrity tests for secure cloud storage. The data audit approach allows an auditor to verify the consistency of the data files and submit the data owner's verification report, without understanding the files. This paper offers an RSA modified elliptic curve (ECMRSA) and an algorithm modified to md5 for the purpose of verifying the integrity of cloud data, to upload the encrypted data files of data users or proprietors to the cloud data server and send a request for a third-party audit to the auditor. On behalf of data holders, a third-party auditor (TPA) is called by the data server to ensure the file is credible. The auditor sends the audit report to the owner following maintenance of the data file accuracy. A public key coding scheme with homomorphic algorithms that produces a digital file signature or hash values for coded files is included in the proposed audit algorithm.","PeriodicalId":347608,"journal":{"name":"International Journal of Engineering and Innovative Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Integrity Monitoring with ECMRSA Algorithm for Cloud Data Outsourcing\",\"authors\":\"D. V. Thang, N. D. Pham\",\"doi\":\"10.51456/IJEIT.2020.V10I05.004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With its on-demand technology, cloud computing has advanced to allow vast volumes of data to be interchanged via cloud services. Scalable cloud services that store confidential data on cloud storage servers are therefore critical to the complex management of a number of problem fields: security, privacy, data sharing and cloud server integrity. In addition, in this expanded environment, validity and control of access to data should be retained. One of the core principles for cloud encryption is abe. An interest in this research is the auditing of data or integrity tests for secure cloud storage. The data audit approach allows an auditor to verify the consistency of the data files and submit the data owner's verification report, without understanding the files. This paper offers an RSA modified elliptic curve (ECMRSA) and an algorithm modified to md5 for the purpose of verifying the integrity of cloud data, to upload the encrypted data files of data users or proprietors to the cloud data server and send a request for a third-party audit to the auditor. On behalf of data holders, a third-party auditor (TPA) is called by the data server to ensure the file is credible. The auditor sends the audit report to the owner following maintenance of the data file accuracy. A public key coding scheme with homomorphic algorithms that produces a digital file signature or hash values for coded files is included in the proposed audit algorithm.\",\"PeriodicalId\":347608,\"journal\":{\"name\":\"International Journal of Engineering and Innovative Technology\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Engineering and Innovative Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.51456/IJEIT.2020.V10I05.004\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering and Innovative Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51456/IJEIT.2020.V10I05.004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrity Monitoring with ECMRSA Algorithm for Cloud Data Outsourcing
With its on-demand technology, cloud computing has advanced to allow vast volumes of data to be interchanged via cloud services. Scalable cloud services that store confidential data on cloud storage servers are therefore critical to the complex management of a number of problem fields: security, privacy, data sharing and cloud server integrity. In addition, in this expanded environment, validity and control of access to data should be retained. One of the core principles for cloud encryption is abe. An interest in this research is the auditing of data or integrity tests for secure cloud storage. The data audit approach allows an auditor to verify the consistency of the data files and submit the data owner's verification report, without understanding the files. This paper offers an RSA modified elliptic curve (ECMRSA) and an algorithm modified to md5 for the purpose of verifying the integrity of cloud data, to upload the encrypted data files of data users or proprietors to the cloud data server and send a request for a third-party audit to the auditor. On behalf of data holders, a third-party auditor (TPA) is called by the data server to ensure the file is credible. The auditor sends the audit report to the owner following maintenance of the data file accuracy. A public key coding scheme with homomorphic algorithms that produces a digital file signature or hash values for coded files is included in the proposed audit algorithm.