DocumentCode :
166578
Title :
Data authentication and integrity verification techniques for trusted/untrusted cloud servers
Author :
Kavuri, Satheesh K. S. V. A. ; Kancherla, Gangadhara Rao ; Bobba, Basaveswara Rao
Author_Institution :
Dept. Of CSE, Dhanekula Inst. of Eng. & Technol., Vijayawada, India
fYear :
2014
fDate :
24-27 Sept. 2014
Firstpage :
2590
Lastpage :
2596
Abstract :
Third party cloud storage and access permissions play a vital role in security analysis and user access control. User access control and data verification are the important revolutionary technologies to provide security and control unauthorized users. Third party cloud servers are built without proper security measures and user control mechanisms. User can access the data such as documents, media or other type of files using third party generated authentication key and secret information. Traditional cloud security mechanisms are independent of data integrity verification to the authorized data users. Third party cloud servers are vulnerable to different type of message integrity attacks. Traditional message integrity algorithms are depend on the file size, hash size and security parameters. In order to overcome the security related issues in commercial cloud servers, an improved hash based message integrity verification process was proposed in this paper. Proposed message integrity algorithm was tested on attributed based encryption process. Proposed cloud based hash algorithm generates 512 bit size hash value to each file in the third party cloud servers. Only authorized users can access the required files using his/her identity along with the message integrity value. Experimental results show that proposed cloud based hash algorithm outperformed well compare to existing models in terms of file size, time and attacks are concern.
Keywords :
authorisation; cloud computing; cryptography; formal verification; message authentication; trusted computing; access permissions; attributed based encryption process; cloud based hash algorithm; cloud security mechanisms; data authentication; data integrity verification; data user authorization; data verification; hash based message integrity verification process; integrity verification techniques; message integrity attacks; secret information; security analysis; third party cloud servers; third party cloud storage; third party generated authentication key; untrusted cloud server; user access control; word length 512 bit; Cloud computing; Encryption; Heuristic algorithms; Partitioning algorithms; Servers; Amazon aws; Cloud based hashing; Data integrity; Third party cloud servers; unauthorized users;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on
Conference_Location :
New Delhi
Print_ISBN :
978-1-4799-3078-4
Type :
conf
DOI :
10.1109/ICACCI.2014.6968657
Filename :
6968657
Link To Document :
بازگشت