Abstract
Cloud computing enable the users to outsource and access data economically using storage as a service. In this storage model, the data owner doesnot have any control of the data once its stores on cloud server. Therefore, privacy and security of the data is a challenging issue in cloud computing. To provide the integrity of the outsourced data, we have proposed a lightweight data auditing technique such as MD5 and ECDSA signature method using third party auditor. The result analysis of the proposed method shows that, ECDSA has better security performance than the computation as compared to MD5 method for larger data size. The selection of the signature method depends on the priority of the data size and frequency of accessing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, J., Huang, K., Rong, H., Wang, H., Xian, M.: Privacy-preserving public auditing for regenerating-code-based cloud storage. IEEE Trans. Inf. Forensics Secur. 10(7), 1513–1528 (2015)
Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallen Distrib. Syst. 23(12), 2231–2244 (2012)
Wang, H., He, D., Tang, S.: Identity-based distributed provable data possession in multi-cloud storage. IEEE Trans. Inf. Forensics Secur. 11(6), 1165–1176 (2016)
Yu, Y., Au, M., Ateniese, G., Huang, X., Susilo, W., Dai, Y., Min, G.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)
Yang, L., Xia, L.: An efficient and secure public batch auditing protocol for dynamic cloud storage data. In: IEEE International Computer Symposium, pp. 671–675 (2016)
Wang, Y., Wu, Q., Qin, B., Shi, W., Deng, R.H., Hu, J.: Identitybased data outsourcing with comprehensive auditing in clouds. IEEE Trans. Inf. Forensics Secur. 12(4), 940–952 (2017)
Zhang, Y., Xu, C., Liang, X., Li, H., Mu, Y., Zhang, X.: Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans. Inf. Forensics Secur. 12(3), 676–688 (2017)
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: International Cryptology Conference on Advances in Cryptology (CRYPTO 1996), pp. 1–15 (1996)
Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Tran. Cloud Comput. 2, 43–56 (2014)
Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)
Chauhan, M.M.: An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5. In: IEEE International Conference on Inventive Computation Technologies (ICICT), vol. 3, pp. 1–6 (2016)
Indrayani, R., Nugroho, H.A., Hidayat, R., Pratama, I.: Increasing the security of MP3 steganography using AES encryption and MD5 hash function. In: IEEE 2nd International Conference on Science and Technology-Computer (ICST), pp. 129–132 (2016)
Zhong, L., Wan, W., Kong, D.: Javaweb login authentication based on improved MD5 algorithm. In: IEEE International Conference on Audio, Language and Image Processing (ICALIP), vol. 3, pp. 131–135 (2016)
van Rijswijk-Deij, R., Jonker, M., Sperotto, A.: On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC. In: IEEE 12th International Conference on Network and Service Management (CNSM), pp. 258–262 (2016)
Li, H., Zhang, R., Yi, J., Lv, H.: A novel algorithm for scalar multiplication in ECDSA. In: IEEE International Conference on Computational and Information Sciences, pp. 943–946 (2013)
van Rijswijk-Deij, R., Hageman, K., Sperotto, A., Pras, A.: The performance impact of elliptic curve cryptography on DNSSEC validation. IEEEACM Trans. Netw. 25(2), 738–750 (2017)
Kneevi, M., Nikov, V., Rombouts, P.: Low-latency ECDSA signature verificationa road toward safer traffic. IEEE Trans. Very Large Scale Integr. VLSI Syst. 24(11), 3257–3267 (2016)
Yalin, T.: Compact ECDSA engine for IoT applications. IEEE Electron. Lett. 52(15), 1310–1312 (2016)
Redondo, J.M., Ortin, F.: A comprehensive evaluation of common python implementations. IEEE Softw. 32(4), 76–84 (2015)
Sun, D., Fu, M., Zhu, L., Li, G., Lu, Q.: Nonintrusive anomaly detection with streaming performance metrics and logs for DevOps in public clouds: a case study in AWS. IEEE Trans. Emerg. Topics Comput. 4(2), 278–289 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Prakash, G.L., Prateek, M., Singh, I. (2018). Performance Analysis of Cloud Data Verification Using MD5 and ECDSA Method. In: Panda, B., Sharma, S., Roy, N. (eds) Data Science and Analytics. REDSET 2017. Communications in Computer and Information Science, vol 799. Springer, Singapore. https://doi.org/10.1007/978-981-10-8527-7_52
Download citation
DOI: https://doi.org/10.1007/978-981-10-8527-7_52
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8526-0
Online ISBN: 978-981-10-8527-7
eBook Packages: Computer ScienceComputer Science (R0)