We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Enhancing Data Dynamics and Storage Security for Cloud Computing using Merkle Hash Tree and AES Algorithms

by Poonam M. Pardeshi, Deepali R. Borade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 21
Year of Publication: 2014
Authors: Poonam M. Pardeshi, Deepali R. Borade
10.5120/17304-7734

Poonam M. Pardeshi, Deepali R. Borade . Enhancing Data Dynamics and Storage Security for Cloud Computing using Merkle Hash Tree and AES Algorithms. International Journal of Computer Applications. 98, 21 ( July 2014), 1-7. DOI=10.5120/17304-7734

@article{ 10.5120/17304-7734,
author = { Poonam M. Pardeshi, Deepali R. Borade },
title = { Enhancing Data Dynamics and Storage Security for Cloud Computing using Merkle Hash Tree and AES Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 21 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number21/17304-7734/ },
doi = { 10.5120/17304-7734 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:27:00.481888+05:30
%A Poonam M. Pardeshi
%A Deepali R. Borade
%T Enhancing Data Dynamics and Storage Security for Cloud Computing using Merkle Hash Tree and AES Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 21
%P 1-7
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With increase in the number of cloud users and the amount of sensitive data on cloud, security of cloud has become more important. Massively scalable data centers are provided by the cloud which can be accessed from anywhere and at anytime. Cloud computing allows users to store data and access it on demand thereby utilizing fewer resources in client system. However many malicious activities in cloud have accompanied the growth of cloud users. One of the greatest security challenges is storage security in cloud. It must make possible for users to store data without worrying about the need to verify its integrity. Thus, enabling public auditing for cloud storage is of critical importance so that users can restore to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. In this paper we make use of Public-Auditing. We propose a way in which the Merkle Hash Tree (MHT) used in a method called RSASS, is made dynamic by using the concept of relative index to compute the index of leaf node quickly and a dynamic operation scheme based on this tree structure for cloud storage. Also, instead of using RSA algorithm, we have made use of AES algorithm because AES requires less encryption-decryption time as well as less buffer space as compared to RSA algorithm. We thus propose a simple data protection model where data is encrypted using Advanced Encryption Standard (AES) before it is launched in the cloud, thus ensuring data-confidentiality and security.

References
  1. Y. Deswarte, J. Quisquater, and A. Saidane, "Remote integrity checking", In Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS'03), November 2003.
  2. T. Schwarz and E. L. Miller, "Store, forget, and check: Using algebraic signatures to check remotely administered storage", In Proceedings of ICDCS '06. IEEE Computer Society, 2006.
  3. G. Ateniese, "Provable Data Possession at Untrusted Stores", Proc. 14th ACM Conf. Computer and Comm. Security (CCS' 07), 2007.
  4. A. Juels, "Pors: Proofs of Retrievability for Large Files," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 584-597, 2007.
  5. G. Ateniese, "Scalable and Efficient Provable Data Possession", Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '08), 2008.
  6. C,Erway, A. Kuocu, C. Pamanthou, R. Tamassia, "Dynamic Provable Data Possession", Proc. 16th ACM Conf. Computer and Comm. Security (CCS'09),2009.
  7. Cong Wang, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions on Parallel and Distributed Systems, May 2011.
  8. C. Wang, Q. Wang, Kui Ren, Wenjing Lou, "Ensuring Dynamic Data Storage Security in Cloud Computing", Proc. 17th Int'1 Workshop Quality of Service (IWQos'09),2009.
  9. P. Golle, S. Jarecki, and I. Mironov "Cryptographic primitives enforcing communication and storage complexity". In Financial Cryptography, pages 120-135, 2002.
  10. L. Chen and H. Chen,"Ensuring Dyanmic Data Integrity with Public Auditing for Cloud Storage", In Proc. Of International Conference on Computer Science and Service System (ICSSS' 2012), 2012.
  11. D. G. Feng, M. Zang, Y. Zang and Z. Xu,"Study on cloud computing security", Journal of Software, vol. 22 (1), pp. 71-83, 2011.
  12. L. M. Kunfam, "Data Security in the world of cloud computing", IEEE Security and Privacy, vol. 7 (4),pp. 61-64,2009.
  13. B. Waters and H. Shacham, "Compact proofs of Retrievability", Proc. 14th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT' 08), pp. 90-107, 2008.
  14. M. Venkatesh, "Improving Public Auditability, Data Possession in Data Storage Security for Cloud Computing", ICRTIT-IEEE 2012
  15. Elminaam, Diaa Salama Abdul, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud. "Performance Evaluation of Symmetric Encryption Algorithms. " IJCSNS International Journal of Computer Science and Network Security 8. 12 (2008): 280-286.
  16. Simar Preet Singh, and Raman Maini, "COMPARISON OF DATA ENCRYPTION ALGORITHMS", International Journal of Computer Science and Communication (IJCSC), Vol. 2, No. 1, January-June 2011, pp. 125-127
Index Terms

Computer Science
Information Sciences

Keywords

Advanced Encryption Standard Cloud Computing Data Integrity Dynamics Data Operations Merkle Hash Tree Public Auditability Storage Security.