云计算中的数据完整性验证

G. Gupta
{"title":"云计算中的数据完整性验证","authors":"G. Gupta","doi":"10.9790/0661-1903052327","DOIUrl":null,"url":null,"abstract":"Cloud computing is recognized as a hottest technology which has a significant impact on IT field in the nearby future. Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. That means customers pay providers based on usage. Data Integrity is the major issue in cloud computing. To provide the integrity various methods have been proposed by the researchers. In this paper we will proposed a model which will provide the data integrity using Elgamal Algorithm and SHA-2 Algorithm. The Proposed model shows that the data which is uploaded on cloud is secured if the hash key matches with the local keys which are stored on the system.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Integrity Verification in Cloud Computing\",\"authors\":\"G. Gupta\",\"doi\":\"10.9790/0661-1903052327\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is recognized as a hottest technology which has a significant impact on IT field in the nearby future. Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. That means customers pay providers based on usage. Data Integrity is the major issue in cloud computing. To provide the integrity various methods have been proposed by the researchers. In this paper we will proposed a model which will provide the data integrity using Elgamal Algorithm and SHA-2 Algorithm. The Proposed model shows that the data which is uploaded on cloud is secured if the hash key matches with the local keys which are stored on the system.\",\"PeriodicalId\":91890,\"journal\":{\"name\":\"IOSR journal of computer engineering\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IOSR journal of computer engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.9790/0661-1903052327\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IOSR journal of computer engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9790/0661-1903052327","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

云计算是公认的最热门的技术,在不久的将来将对IT领域产生重大影响。云计算是一种基于互联网的计算。它为组织提供服务,如存储、应用程序和服务器。云计算是按需付费的服务。这意味着用户根据使用情况向提供商付费。数据完整性是云计算中的主要问题。为了提供完整性,研究人员提出了各种方法。在本文中,我们将提出一个使用Elgamal算法和SHA-2算法提供数据完整性的模型。该模型表明,如果哈希密钥与存储在系统上的本地密钥匹配,则上传到云上的数据是安全的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Data Integrity Verification in Cloud Computing
Cloud computing is recognized as a hottest technology which has a significant impact on IT field in the nearby future. Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. That means customers pay providers based on usage. Data Integrity is the major issue in cloud computing. To provide the integrity various methods have been proposed by the researchers. In this paper we will proposed a model which will provide the data integrity using Elgamal Algorithm and SHA-2 Algorithm. The Proposed model shows that the data which is uploaded on cloud is secured if the hash key matches with the local keys which are stored on the system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信