Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment

  • Akshay K. C.Email author
  • Balachandra Muniyal
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)


Cloud computing is one of the latest and encouraging solutions to the increasing demand for using and accessing the resources endowed over the internet. It has significantly emerged as a standard for deploying services, applications for both end-users and enterprises. It offers powerful processing and storage resources as on-demand services with reduced cost, increased efficiency and performance. All these features promote enterprises, critical infrastructure providers and even government projects or applications to drift towards the cloud. In recent years, for all the fast growing segments of Information Technology industry, cloud computing has grown as a promising business concept. However, issues begin to grow on cloud as vast amount of information of individuals and organizations are stored on cloud, which raise a question about cloud environment providing stability, reliability and safety. With many well provisioned, well adapted promising facilities and benefits, there are still a number of technical obstacles such as security and quality of service which hinder the proper utilization of the cloud. In this regard, a possible solution is proposed to provide high level confidentiality by preserving the data integrity. An analysis is performed for the proposed method to verify the repeatability in the encryption process in given environment.


  1. 1.
  2. 2.
  3. 3.
    Anisetti, M., Ardagna, C., Damiani, E., Gaudenzi, F.: A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE Trans. Serv. Comput. (2017)Google Scholar
  4. 4.
    Armbrust, M., et al.: A view on cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  5. 5.
    Hamdaqa, M., Tahvildari, L.: Cloud computing uncovered: a research landscape. Adv. Comput. 86, 41–85 (2012)CrossRefGoogle Scholar
  6. 6.
    Kaaniche, N.: Cloud data storage security based on cryptographic mechanisms. Ph.D. dissertation, Informatique, Télécommunications et Électronique de Paris (2014)Google Scholar
  7. 7.
    Kwon, O., Koo, D., Shin, Y., Yoon, H.: A secure and efficient audit mechanism for dynamic shared data in cloud storage. Sci. World J. 2014, 10 (2014)Google Scholar
  8. 8.
    Li, R., Shen, C., He, H., Gu, X., Xu, Z., Xu, C.Z.: A lightweight secure data sharing scheme for mobile cloud computing. IEEE Trans. Cloud Comput. 6(2), 344–357 (2018)CrossRefGoogle Scholar
  9. 9.
    Mell, P., Grance, T.: NIST definition of cloud computing. National Institute of Standards and Technology (2009)Google Scholar
  10. 10.
    More, S., Chaudhari, S.: Third party public auditing scheme for cloud storage. In: 7th International Conference on Communication, Computing and Virtualization (2016)Google Scholar
  11. 11.
    Srinivasan, M.K., Sarukesi, K., Rodrigues, P., Manoj, M.S., Revathy, P.: State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp. 470–476 (2012)Google Scholar
  12. 12.
    Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRefGoogle Scholar
  13. 13.
    Winkler, V.J.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress, Waltham (2011)Google Scholar
  14. 14.
    Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717–1726 (2015)CrossRefGoogle Scholar
  15. 15.
    Zargad, S.V., Tambile, A.V., Sankoli, S.S., Bhongale, R.C.: Data integrity checking protocol with data dynamics and public verifiability for secure cloud computing. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5(3), 4062–4064 (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Information and Communication TechnologyManipal Institute of Technology, Manipal Academy of Higher EducationManipalIndia

Personalised recommendations