Review Paper on Data Integrity for Cloud
Shivani Kaushik1 , Anirudh Tripathi2 , Pankaj Pratap Singh3 , Amit Kishor4
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-5 , Page no. 1408-1411, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.14081411
Online published on May 31, 2019
Copyright © Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor, “Review Paper on Data Integrity for Cloud,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1408-1411, 2019.
MLA Style Citation: Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor "Review Paper on Data Integrity for Cloud." International Journal of Computer Sciences and Engineering 7.5 (2019): 1408-1411.
APA Style Citation: Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor, (2019). Review Paper on Data Integrity for Cloud. International Journal of Computer Sciences and Engineering, 7(5), 1408-1411.
BibTex Style Citation:
@article{Kaushik_2019,
author = {Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor},
title = {Review Paper on Data Integrity for Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1408-1411},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4422},
doi = {https://doi.org/10.26438/ijcse/v7i5.14081411}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.14081411}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4422
TI - Review Paper on Data Integrity for Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1408-1411
IS - 5
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
297 | 246 downloads | 115 downloads |
Abstract
Usage of internet applications has increased in this world of technology. Growing technology has both advantages and disadvantages. On the one hand, it provides lots of comfort and ease, on the other hand, it provides it poses a security threat. To secure our communication over the internet we use cryptography. Cryptography is done using asymmetric cryptography and symmetric cryptography. Asymmetric cryptography uses two keys, one is used for encryption and other is used for decryption. The key used for encryption is public and it is not required to keep it secret. While key used for decryption is always kept secret. In symmetric cryptography both the keys are same and both need to be secret. RSA is a popular cryptography algorithm. It is an asymmetric-key algorithm. Diffie-Hellman is an algorithm which uses symmetric keys. This paper presents a novel modified hybrid RSA-Diffie Hellman algorithm, in order to utilize the key benefits of both.
Key-Words / Index Term
decryption, public key, prime number, RSA algorithm, Diffie Hellman algorithm
References
[1] Mahalakshmi and Suseendran G., (2018). "An analysis of Cloud Computing issues on data Integrity, privacy, and its current solutions".
[2] K David Raju, L Vijay Kumar, K Anthony Rahul Showry, B LhoitKrishn ,(2018) ." techniques of providing data integrity in cloud computing".
[3] Joseph Selvanayagam1, Akash Singh2, Joans Michael3, Jaya Jeswani4 (2018) ."secure file storage on cloud using cryptography".
[4]https://searchsecurity.techtarget.com/definition/asymmetric-cryptography
[5] Shreen Nisha, Mohammed Farik (2017), " RSA public key cryptography algorithm - a review", international journal of scientific and technology research volume 6.
[6] Prabhat Kumar Panda, (2017). "A hybrid security algorithm for RSA cryptosystem".
[7] Sultan Aldossary, William Allen, (2016). "Data Security, Privacy, Availability, and Integrity in Cloud Computing: Issues and Current Solutions".
[8] Ayan Roy (2016)," brief comparison of RSA and Diffie-hellman (public key) algorithm"
[9] Israt Jahan, Mohammad Asif, Liton Jude Rozario (2015),
Improved RSA cryptosystem based on the study of number theory and public key cryptosystems. American Journal of Engineering research.
[10]https://www.ibm.com/support/knowledgecenter/en/SSB23S_1.1.0.14/gtps7/s7symm.html
[11] Miss. Renushree Bodkhe , Prof. Vimla Jethani , (2015) "Hybrid encryption algorithm based improved RSA and Diffie - Hellman ".
[12] Gaurav R. Patel, Prof. Krunal Panchal (2014), "Hybrid encryption Algorithm".
[13] Mahima Joshi, Yudhveer Singh Moudgil,"secure Cloud Storage."
[14]Sarthak R Patel, Prof. Khushbu Shah, Gaurav R Patel, "Study on Improvements in RSA algorithm"
[15] P. Anusha, . R. Maruthi ” A survey paper on data integrity for cloud”
[16] Shraddha Saxena , Manish Sharma “Secure technique to achieve data privacy and data integrity in cloud computing “