Abstracto

DATA INTEGRITY USING ENCRYPTION IN CLOUD COMPUTING

Regil V Raju, M.Vasanth, Udaykumar P

Data integrity is an important phase in cloud computing. Since the previous couple of years the protocols that was evoked during this field has reached greater heights.[1] Existing protocols with the assistance of a third-party auditor in an exceedingly previous work, Sebe´et al propose a data integrity verifying protocol that supports information dynamics[2]. During this paper, we adapt Sebe´et al.â�?�?s protocol to support information authentication. The outlined protocol supports information verification while not facilitate of a third-party auditor [3]. In addition, the projected protocol doesn't leak any personal data to third-party verifiers. Through a correct diagnosing we are going to be measurement however sensible will the system works. After that, through thorough analysis, we will show that the protocol encompasses a sensible performance.

Indexado en

Google Académico
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Biblioteca de revistas electrónicas
Búsqueda de referencia
Universidad Hamdard
director académico
Factor de impacto de revistas innovadoras internacionales (IIJIF)
Instituto Internacional de Investigación Organizada (I2OR)
Cosmos

Ver más