Abstract
Cloud computing is growing in quality thanks to its ability to supply dynamically ascendible resources provisioned as services no matter user or location device. However, moving knowledge to the cloud means the management of the info is a lot of within the hands of the cloud supplier instead of the info owner. Despite the advantages that the cloud presents, cloud computing technology is moon-faced with a range of legal and technological challenges. Security and privacy are amongst the most important challenges as known. There should be certain type of system to guarantee the integrity of the records. The current Cloud safety model is sited on the interpretation that the client should trust the source. Guaranteeing documents integrity needs a promise of trust among the customer and the supplier. Numerous cryptographic methods have been developed and used to deliver improved safety for the sake of keeping integrity issues. We assume that our file (F) is divided into n shares. Poly1305 could be a cryptographically message authentication code (MAC). It is often wont to verify the info integrity and therefore the legitimacy of a message. Shamir Secret Sharing is used to split client file into n shares and these shares are further encrypted using poly1305. An Effective Integrity Verification Scheme (EIVS) based SSS and Poly-1305 is implemented and compared with SSS-AES. Entropy and Timing analysis of EIVS is done for short, long and larger text files.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Parmar1, S.K., Dave, K.C.: A review on various most common symmetric encryptions algorithms. IJSRD – Int. J. Sci. Res. Dev. 1(4) (2013)
Rasheed, H.: Data and infrastructure security auditing in cloud computing environments. Int. J. Inf. Manage. 34(3), 364–368 (2014)
Sirohi,P., Agarwal, A.: Cloud computing data storage security framework relating to data integrity, privacy and trust. In: 2015 1st International Conference on Next Generation Computing Technologies (NGCT), pp. 115–118. Dehradun (2015). https://doi.org/10.1109/NGCT.2015.7375094
Marquez, L., Rosado, D.G., Mouratidis, H., Fernandez Medina, E.: Design activity in the process of migrating security features to cloud. In: IEEE Latin America Transactions, vol. 14, no. 6, pp. 2846–2852 (June 2016). https://doi.org/10.1109/TLA.2016.7555263
Subha, T., Jayashri, S.: Efficient privacy preserving integrity checking model for cloud data storage security. In: 2016 Eighth International Conference on Advanced Computing (ICoAC), pp. 55–60. Chennai (2017). https://doi.org/10.1109/ICoAC.2017.7951745
Binu, V.P., Sreekumar, A.: Simple and efficient secret sharing schemes for sharing data and image. Int. J. Comput. Sci. Inform. Technol. 6(1), 404–409 (2015)
Raipure, A.A., Alvi, A.S., Deshmukh, P.P.: An approach secret sharing algorithm in cloud computing security over single to multi cloud. Int. Res. J. Eng. Technol. (IRJET), 03(06) (June 2016)
Tieng, D.G., Nocon, E.: Some attacks on Shamir’s secret sharing scheme by inside adversaries. In: Presented at the DLSU Research Congress 2016 De La Salle University, Manila, Philippines, 7–9 March 2016
Farrà s, O., Hansen, T.B., Kaced, T., Padró, C.: On the information ratio of non-perfect secret sharing schemes. Algorithmica 79(4), 987–1013 (2016). https://doi.org/10.1007/s00453-016-0217-9
Calkavur, S., Molla, F.: An image secret sharing method based on Shamir secret sharing. Curr. Trends Comput. Sci. Appl. App 1(2). CTCSA (2018)
Molla, F., Calkavur, S.: A new approach to construct secret sharing schemes based on field extensions. Eur. J. Pure Appl. Math. 11(2), 468–475 (2018)
Iwamoto, M., Yamamoto, H., Ogawa, H.: Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures. [cs.CR]. IEEE (2018) arXiv:cs/0506064v1
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kamboj, M., Rana, S. (2022). An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing. In: Abraham, A., et al. Innovations in Bio-Inspired Computing and Applications. IBICA 2021. Lecture Notes in Networks and Systems, vol 419. Springer, Cham. https://doi.org/10.1007/978-3-030-96299-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-96299-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96298-2
Online ISBN: 978-3-030-96299-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)