Abstract
The Cloud Environment provides storage for files as well as sharing services for disseminated clients. This technology helps users in the cloud to outsource their data and get good quality services from the cloud. Often, Data Integrity is a serious issue in Cloud Storage because the service provider is a semi-trusted one. Consequently, a self-determining auditing service is essential to check data integrity. In this paper, we developed a secure Cloud Storage environment without a third-party system and proposed an Improved Rivest-Shamir-Adleman Encryption Algorithm (IREA) along with the Flexible Capacity Cuckoo Filter (FCCF) auditing technique without Third Party Auditing. In this proposed system, the data owner encrypts the data using Improved RSA and stores it in the Cloud Service, and users alone can decrypt the data with the knowledge of the data owner. Furthermore, the FCCF ensures the integrity of the verification and secure data transactions can be provided by using the Two Level Quick Response (2LQR) code. The experimental results validate that the proposed IREA-FCCF with the 2LQR technique for data security in a CE has less time compared to that of the existing schemes in terms of encryption time, decryption time, signature generation, signature verification, and cost of the dynamic records.
Similar content being viewed by others
References
Garg, N., Bawa, S., & Kumar, N. (2020). An efficient data integrity auditing protocol for cloud computing. Future Generation Computer Systems., 1(109), 306–316.
Chinnasamy, P., Padmavathi, S., Swathy, R., & Rakesh, S. (2021). Efficient data security using hybrid cryptography on cloud computing. In G. Ranganathan, J. Chen, & Á. Rocha (Eds.), InInventive communication and computational technologies (pp. 537–547). Springer.
Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218–226.
Wei, P., Wang, D., Zhao, Y., Tyagi, S. K., & Kumar, N. (2020). Blockchain data-based cloud data integrity protection mechanism. Future Generation Computer Systems., 1(102), 902–911.
Malik, A., & Om, H. (2018). Cloud computing and internet of things integration: architecture, applications, issues, and challenges. In W. Rivera (Ed.), Sustainable cloud and energy services (pp. 1–24). Springer International Publishing.
Cheng, L., van Dongen, B. F., & van der Aalst, W. M. (2019). Scalable discovery of hybrid process models in a cloud computing environment. IEEE Transactions on Services Computing, 13(2), 368–380.
Zhou, L., Li, X., Yeh, K. H., Su, C., & Chiu, W. (2019). Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Generation Computer Systems, 91, 244–251.
Amin, R., Kumar, N., Biswas, G. P., Iqbal, R., & Chang, V. (2018). A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Generation Computer Systems, 78, 1005–1019.
Ghallab, A., Saif, M. H., Mohsen, A. (2021). Data integrity and security in distributed cloud computing—a review. In: Proceedings of international conference on recent trends in machine learning, IOT, smart cities and applications 2021 (pp. 767–784). Springer.
Megouache, L., Zitouni, A., & Djoudi, M. (2020). Ensuring user authentication and data integrity in multi-cloud environment. Human-Centric Computing and Information Sciences, 10(1), 1–20.
Wang, Y., Miao, M., Shen, J., & Wang, J. (2019). Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Computing, 23(6), 2101–2112.
Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020). Towards DNA based data security in the cloud computing environment. Computer Communications, 151, 539–547.
Tahir, M., Sardaraz, M., Mehmood, Z., & Muhammad, S. (2021). CryptoGA: A cryptosystem based on genetic algorithm for cloud data security. Cluster Computing, 24(2), 739–752.
Akande, N. O., Abikoye, C. O., Adebiyi, M. O., Kayode, A. A., Adegun, A. A., & Ogundokun, R. O. (2019). Electronic medical information encryption using modified blowfish algorithm. In: International conference on computational science and its applications, pp. 166–179.
Abroshan, H. (2021). A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms. International Journal of Advanced Computer Science and Applications. https://doi.org/10.14569/IJACSA.2021.0120604
Prakash, R., Chithaluru, P., Sharma, D., Srikanth, P. (2019). Implementation of trapdoor functionality to two-layer encryption and decryption by using RSA-AES cryptography algorithms. In: Nanoelectronics, circuits and communication systems, pp. 89-95.
Xiang, T., Li, X., Chen, F., Yang, Y., & Zhang, S. (2018). Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud. Journal of Parallel and Distributed Computing, 112, 97–107.
Zhao, Q., Chen, S., Liu, Z., Baker, T., & Zhang, Y. (2020). Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing & Management, 57(6), 102355.
Kumar, S., Karnani, G., Gaur, MS., Mishra, A. (2021). Cloud security using hybrid cryptography algorithms. In: 2021 2nd International conference on intelligent engineering and management (ICIEM) 2021 Apr 28 (pp. 599–604). IEEE.
Dhamodaran, M., Punarselvam, E., Varshan, S. D., Kumar, P. D., Saravanan, C., Prathap, K. (2021). Security and privacy of sensitive data in cloud computing using RSA. International Journal of Scientific Research in Science and Technology, 657–661.
Abid, R., Iwendi, C., Javed, A. R., Rizwan, M., Jalil, Z., Anajemba, J. H., & Biamba, C. (2021). An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Personal and Ubiquitous Computing., 1, 1–4.
Goyal, V., & Kant, C. (2018). An effective hybrid encryption algorithm for ensuring cloud data security. In V. B. Aggarwal, V. Bhatnagar, & D. K. Mishra (Eds.), Big data analytics (pp. 195–210). Springer.
Lee, B. H., Dewi, E. K., & Wajdi, M. F. (2018). Data security in cloud computing using AES under HEROKU cloud. In: 2018 27th wireless and optical communication conference (WOCC), pp. 1–5.
Yang, Y., Chen, X., Chen, H., & Du, X. (2018). Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access, 6, 18009–18021.
Li, J., Chen, N., & Zhang, Y. (2019). Extended file hierarchy access control scheme with attribute based encryption in cloud computing. IEEE Transactions on Emerging Topics in Computing.
Sharma, G., & Kalra, S. (2018). Identity based secure authentication scheme based on quantum key distribution for cloud computing. Peer-to-Peer networking and applications, 11(2), 220–234.
Wu, L., Chen, B., Zeadally, S., & He, D. (2018). An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Computing, 22(23), 7685–7696.
Sharma, S., Singla, K., Rathee, G., & Saini, H. (2020). A hybrid cryptographic technique for file storage mechanism over cloud. In: First international conference on sustainable technologies for computational intelligence (pp. 241–256).
Khedr, W. I., Khater, H. M., & Mohamed, E. R. (2019). Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage. IEEE Access, 7, 65635–65651.
Yu, Y., Li, Y., Yang, B., Susilo, W., Yang, G., & Bai, J. (2017). Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Transactions on Emerging Topics in Computing, 8(2), 377–390.
Li, Y., Yu, Y., Chen, R., Du, X., & Guizani, M. (2020). integritychain: Provable data possession for decentralized storage. IEEE Journal on Selected Areas in Communications, 38(6), 1205–1217.
Funding
There is no funding for this study.
Author information
Authors and Affiliations
Contributions
All the authors have participated in writing the manuscript and have revised the final version. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
Authors declare that they have no conflict of interest.
Ethical Approval
This article does not contain any studies with human participants and/or animals performed by any of the authors.
Informed Consent
There is no informed consent for this study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Neela, K.L., Kavitha, V. An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud. Wireless Pers Commun 123, 2431–2448 (2022). https://doi.org/10.1007/s11277-021-09248-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09248-8