Open Access   Article Go Back

Review Paper on Data Integrity for Cloud

Shivani Kaushik1 , Anirudh Tripathi2 , Pankaj Pratap Singh3 , Amit Kishor4

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1408-1411, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.14081411

Online published on May 31, 2019

Copyright © Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor, “Review Paper on Data Integrity for Cloud,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1408-1411, 2019.

MLA Style Citation: Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor "Review Paper on Data Integrity for Cloud." International Journal of Computer Sciences and Engineering 7.5 (2019): 1408-1411.

APA Style Citation: Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor, (2019). Review Paper on Data Integrity for Cloud. International Journal of Computer Sciences and Engineering, 7(5), 1408-1411.

BibTex Style Citation:
@article{Kaushik_2019,
author = {Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor},
title = {Review Paper on Data Integrity for Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1408-1411},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4422},
doi = {https://doi.org/10.26438/ijcse/v7i5.14081411}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.14081411}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4422
TI - Review Paper on Data Integrity for Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Shivani Kaushik, Anirudh Tripathi, Pankaj Pratap Singh, Amit Kishor
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1408-1411
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
271 221 downloads 94 downloads
  
  
           

Abstract

Usage of internet applications has increased in this world of technology. Growing technology has both advantages and disadvantages. On the one hand, it provides lots of comfort and ease, on the other hand, it provides it poses a security threat. To secure our communication over the internet we use cryptography. Cryptography is done using asymmetric cryptography and symmetric cryptography. Asymmetric cryptography uses two keys, one is used for encryption and other is used for decryption. The key used for encryption is public and it is not required to keep it secret. While key used for decryption is always kept secret. In symmetric cryptography both the keys are same and both need to be secret. RSA is a popular cryptography algorithm. It is an asymmetric-key algorithm. Diffie-Hellman is an algorithm which uses symmetric keys. This paper presents a novel modified hybrid RSA-Diffie Hellman algorithm, in order to utilize the key benefits of both.

Key-Words / Index Term

decryption, public key, prime number, RSA algorithm, Diffie Hellman algorithm

References

[1] Mahalakshmi and Suseendran G., (2018). "An analysis of Cloud Computing issues on data Integrity, privacy, and its current solutions".
[2] K David Raju, L Vijay Kumar, K Anthony Rahul Showry, B LhoitKrishn ,(2018) ." techniques of providing data integrity in cloud computing".
[3] Joseph Selvanayagam1, Akash Singh2, Joans Michael3, Jaya Jeswani4 (2018) ."secure file storage on cloud using cryptography".
[4]https://searchsecurity.techtarget.com/definition/asymmetric-cryptography
[5] Shreen Nisha, Mohammed Farik (2017), " RSA public key cryptography algorithm - a review", international journal of scientific and technology research volume 6.
[6] Prabhat Kumar Panda, (2017). "A hybrid security algorithm for RSA cryptosystem".
[7] Sultan Aldossary, William Allen, (2016). "Data Security, Privacy, Availability, and Integrity in Cloud Computing: Issues and Current Solutions".
[8] Ayan Roy (2016)," brief comparison of RSA and Diffie-hellman (public key) algorithm"
[9] Israt Jahan, Mohammad Asif, Liton Jude Rozario (2015),
Improved RSA cryptosystem based on the study of number theory and public key cryptosystems. American Journal of Engineering research.
[10]https://www.ibm.com/support/knowledgecenter/en/SSB23S_1.1.0.14/gtps7/s7symm.html
[11] Miss. Renushree Bodkhe , Prof. Vimla Jethani , (2015) "Hybrid encryption algorithm based improved RSA and Diffie - Hellman ".
[12] Gaurav R. Patel, Prof. Krunal Panchal (2014), "Hybrid encryption Algorithm".
[13] Mahima Joshi, Yudhveer Singh Moudgil,"secure Cloud Storage."
[14]Sarthak R Patel, Prof. Khushbu Shah, Gaurav R Patel, "Study on Improvements in RSA algorithm"
[15] P. Anusha, . R. Maruthi ” A survey paper on data integrity for cloud”
[16] Shraddha Saxena , Manish Sharma “Secure technique to achieve data privacy and data integrity in cloud computing “