Skip to main content
Log in

An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The Cloud Environment provides storage for files as well as sharing services for disseminated clients. This technology helps users in the cloud to outsource their data and get good quality services from the cloud. Often, Data Integrity is a serious issue in Cloud Storage because the service provider is a semi-trusted one. Consequently, a self-determining auditing service is essential to check data integrity. In this paper, we developed a secure Cloud Storage environment without a third-party system and proposed an Improved Rivest-Shamir-Adleman Encryption Algorithm (IREA) along with the Flexible Capacity Cuckoo Filter (FCCF) auditing technique without Third Party Auditing. In this proposed system, the data owner encrypts the data using Improved RSA and stores it in the Cloud Service, and users alone can decrypt the data with the knowledge of the data owner. Furthermore, the FCCF ensures the integrity of the verification and secure data transactions can be provided by using the Two Level Quick Response (2LQR) code. The experimental results validate that the proposed IREA-FCCF with the 2LQR technique for data security in a CE has less time compared to that of the existing schemes in terms of encryption time, decryption time, signature generation, signature verification, and cost of the dynamic records.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Garg, N., Bawa, S., & Kumar, N. (2020). An efficient data integrity auditing protocol for cloud computing. Future Generation Computer Systems., 1(109), 306–316.

    Article  Google Scholar 

  2. Chinnasamy, P., Padmavathi, S., Swathy, R., & Rakesh, S. (2021). Efficient data security using hybrid cryptography on cloud computing. In G. Ranganathan, J. Chen, & Á. Rocha (Eds.), InInventive communication and computational technologies (pp. 537–547). Springer.

    Chapter  Google Scholar 

  3. Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218–226.

    Article  Google Scholar 

  4. Wei, P., Wang, D., Zhao, Y., Tyagi, S. K., & Kumar, N. (2020). Blockchain data-based cloud data integrity protection mechanism. Future Generation Computer Systems., 1(102), 902–911.

    Article  Google Scholar 

  5. Malik, A., & Om, H. (2018). Cloud computing and internet of things integration: architecture, applications, issues, and challenges. In W. Rivera (Ed.), Sustainable cloud and energy services (pp. 1–24). Springer International Publishing.

    Google Scholar 

  6. Cheng, L., van Dongen, B. F., & van der Aalst, W. M. (2019). Scalable discovery of hybrid process models in a cloud computing environment. IEEE Transactions on Services Computing, 13(2), 368–380.

    Article  Google Scholar 

  7. Zhou, L., Li, X., Yeh, K. H., Su, C., & Chiu, W. (2019). Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Generation Computer Systems, 91, 244–251.

    Article  Google Scholar 

  8. Amin, R., Kumar, N., Biswas, G. P., Iqbal, R., & Chang, V. (2018). A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Generation Computer Systems, 78, 1005–1019.

    Article  Google Scholar 

  9. Ghallab, A., Saif, M. H., Mohsen, A. (2021). Data integrity and security in distributed cloud computing—a review. In: Proceedings of international conference on recent trends in machine learning, IOT, smart cities and applications 2021 (pp. 767–784). Springer.

  10. Megouache, L., Zitouni, A., & Djoudi, M. (2020). Ensuring user authentication and data integrity in multi-cloud environment. Human-Centric Computing and Information Sciences, 10(1), 1–20.

    Article  Google Scholar 

  11. Wang, Y., Miao, M., Shen, J., & Wang, J. (2019). Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Computing, 23(6), 2101–2112.

    Article  Google Scholar 

  12. Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020). Towards DNA based data security in the cloud computing environment. Computer Communications, 151, 539–547.

    Article  Google Scholar 

  13. Tahir, M., Sardaraz, M., Mehmood, Z., & Muhammad, S. (2021). CryptoGA: A cryptosystem based on genetic algorithm for cloud data security. Cluster Computing, 24(2), 739–752.

    Article  Google Scholar 

  14. Akande, N. O., Abikoye, C. O., Adebiyi, M. O., Kayode, A. A., Adegun, A. A., & Ogundokun, R. O. (2019). Electronic medical information encryption using modified blowfish algorithm. In: International conference on computational science and its applications, pp. 166–179.

  15. Abroshan, H. (2021). A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms. International Journal of Advanced Computer Science and Applications. https://doi.org/10.14569/IJACSA.2021.0120604

    Article  Google Scholar 

  16. Prakash, R., Chithaluru, P., Sharma, D., Srikanth, P. (2019). Implementation of trapdoor functionality to two-layer encryption and decryption by using RSA-AES cryptography algorithms. In: Nanoelectronics, circuits and communication systems, pp. 89-95.

  17. Xiang, T., Li, X., Chen, F., Yang, Y., & Zhang, S. (2018). Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud. Journal of Parallel and Distributed Computing, 112, 97–107.

    Article  Google Scholar 

  18. Zhao, Q., Chen, S., Liu, Z., Baker, T., & Zhang, Y. (2020). Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing & Management, 57(6), 102355.

    Article  Google Scholar 

  19. Kumar, S., Karnani, G., Gaur, MS., Mishra, A. (2021). Cloud security using hybrid cryptography algorithms. In: 2021 2nd International conference on intelligent engineering and management (ICIEM) 2021 Apr 28 (pp. 599–604). IEEE.

  20. Dhamodaran, M., Punarselvam, E., Varshan, S. D., Kumar, P. D., Saravanan, C., Prathap, K. (2021). Security and privacy of sensitive data in cloud computing using RSA. International Journal of Scientific Research in Science and Technology, 657–661.

  21. Abid, R., Iwendi, C., Javed, A. R., Rizwan, M., Jalil, Z., Anajemba, J. H., & Biamba, C. (2021). An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Personal and Ubiquitous Computing., 1, 1–4.

    Google Scholar 

  22. Goyal, V., & Kant, C. (2018). An effective hybrid encryption algorithm for ensuring cloud data security. In V. B. Aggarwal, V. Bhatnagar, & D. K. Mishra (Eds.), Big data analytics (pp. 195–210). Springer.

    Chapter  Google Scholar 

  23. Lee, B. H., Dewi, E. K., & Wajdi, M. F. (2018). Data security in cloud computing using AES under HEROKU cloud. In: 2018 27th wireless and optical communication conference (WOCC), pp. 1–5.

  24. Yang, Y., Chen, X., Chen, H., & Du, X. (2018). Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access, 6, 18009–18021.

    Article  Google Scholar 

  25. Li, J., Chen, N., & Zhang, Y. (2019). Extended file hierarchy access control scheme with attribute based encryption in cloud computing. IEEE Transactions on Emerging Topics in Computing.

  26. Sharma, G., & Kalra, S. (2018). Identity based secure authentication scheme based on quantum key distribution for cloud computing. Peer-to-Peer networking and applications, 11(2), 220–234.

    Article  Google Scholar 

  27. Wu, L., Chen, B., Zeadally, S., & He, D. (2018). An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Computing, 22(23), 7685–7696.

    Article  Google Scholar 

  28. Sharma, S., Singla, K., Rathee, G., & Saini, H. (2020). A hybrid cryptographic technique for file storage mechanism over cloud. In: First international conference on sustainable technologies for computational intelligence (pp. 241–256).

  29. Khedr, W. I., Khater, H. M., & Mohamed, E. R. (2019). Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage. IEEE Access, 7, 65635–65651.

    Article  Google Scholar 

  30. Yu, Y., Li, Y., Yang, B., Susilo, W., Yang, G., & Bai, J. (2017). Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Transactions on Emerging Topics in Computing, 8(2), 377–390.

    Article  Google Scholar 

  31. Li, Y., Yu, Y., Chen, R., Du, X., & Guizani, M. (2020). integritychain: Provable data possession for decentralized storage. IEEE Journal on Selected Areas in Communications, 38(6), 1205–1217.

    Article  Google Scholar 

Download references

Funding

There is no funding for this study.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have participated in writing the manuscript and have revised the final version. All authors read and approved the final manuscript.

Corresponding author

Correspondence to K. L. Neela.

Ethics declarations

Conflict of interest

Authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants and/or animals performed by any of the authors.

Informed Consent

There is no informed consent for this study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Neela, K.L., Kavitha, V. An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud. Wireless Pers Commun 123, 2431–2448 (2022). https://doi.org/10.1007/s11277-021-09248-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09248-8

Keywords

Navigation