Open Access Open Access  Restricted Access Subscription Access

A Technique for Resource-Strained Devices by Refined Evidence of Retrievability Stratagem of Cloud Storage Services


Affiliations
1 G. H. Raisoni College of Engineering and Management, Wagholi, Pune, India
 

For data integrity issue, previously, due to similar key among users decreases security.Our system implemented digital envelope which provides two keys, asymmetric-key used for encryption of symmetric-key while the data is encrypted using symmetric-key and Multi key word search and used TPA. Experimental outcomes between previous and Proposed security methods demonstrated.

Keywords

Cloud Storage, Digital Envelope, Third Party Auditor, Integrity Checking, Security.
User
Notifications
Font Size

Abstract Views: 141

PDF Views: 0




  • A Technique for Resource-Strained Devices by Refined Evidence of Retrievability Stratagem of Cloud Storage Services

Abstract Views: 141  |  PDF Views: 0

Authors

Ujjwala Bandawane
G. H. Raisoni College of Engineering and Management, Wagholi, Pune, India
Sandeep Gore
G. H. Raisoni College of Engineering and Management, Wagholi, Pune, India

Abstract


For data integrity issue, previously, due to similar key among users decreases security.Our system implemented digital envelope which provides two keys, asymmetric-key used for encryption of symmetric-key while the data is encrypted using symmetric-key and Multi key word search and used TPA. Experimental outcomes between previous and Proposed security methods demonstrated.

Keywords


Cloud Storage, Digital Envelope, Third Party Auditor, Integrity Checking, Security.