Abstrait

DATA INTEGRITY USING ENCRYPTION IN CLOUD COMPUTING

Regil V Raju, M.Vasanth, Udaykumar P

Data integrity is an important phase in cloud computing. Since the previous couple of years the protocols that was evoked during this field has reached greater heights.[1] Existing protocols with the assistance of a third-party auditor in an exceedingly previous work, Sebe´et al propose a data integrity verifying protocol that supports information dynamics[2]. During this paper, we adapt Sebe´et al.âÂ?Â?s protocol to support information authentication. The outlined protocol supports information verification while not facilitate of a third-party auditor [3]. In addition, the projected protocol doesn't leak any personal data to third-party verifiers. Through a correct diagnosing we are going to be measurement however sensible will the system works. After that, through thorough analysis, we will show that the protocol encompasses a sensible performance.

Avertissement: Ce résumé a été traduit à l'aide d'outils d'intelligence artificielle et n'a pas encore été examiné ni vérifié

Indexé dans

Google Scholar
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Electronic Journals Library
RefSeek
Hamdard University
Scholarsteer
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

Voir plus