抽象的

DATA INTEGRITY USING ENCRYPTION IN CLOUD COMPUTING

Regil V Raju, M.Vasanth, Udaykumar P

Data integrity is an important phase in cloud computing. Since the previous couple of years the protocols that was evoked during this field has reached greater heights.[1] Existing protocols with the assistance of a third-party auditor in an exceedingly previous work, Sebe´et al propose a data integrity verifying protocol that supports information dynamics[2]. During this paper, we adapt Sebe´et al.‟s protocol to support information authentication. The outlined protocol supports information verification while not facilitate of a third-party auditor [3]. In addition, the projected protocol doesn't leak any personal data to third-party verifiers. Through a correct diagnosing we are going to be measurement however sensible will the system works. After that, through thorough analysis, we will show that the protocol encompasses a sensible performance.

免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证

索引于

谷歌学术
学术期刊数据库
打开 J 门
学术钥匙
研究圣经
引用因子
电子期刊图书馆
参考搜索
哈姆达大学
学者指导
国际创新期刊影响因子(IIJIF)
国际组织研究所 (I2OR)
宇宙

查看更多