Application of Integrated RSA Encryption in Remote Data Integrity Check

Authors

  • Sagi Sreevibhu Department of Computer Applications
  • Teendra Pavan Kumar Dr. M. G. R. Educational and Research Institute, Chennai - 95

DOI:

https://doi.org/10.53469/jrse.2024.06(08).08

Keywords:

cloud computing, data integrity, RSA, DES, environment, efficiency, data owner, revocable, encryption, integrity

Abstract

Cloud computing storage services offer a convenient means of maintaining and managing large volumes of data at a minimal cost. However, they do not guarantee data integrity. Data is transferred to remote cloud servers that may be unsafe or untrustworthy, raising the risk of unauthorized manipulation by external entities or unintentional modification by service providers. Protecting data from potential hackers has thus become imperative to safeguard its integrity. To address this challenge, the paper proposes an Enhanced Data Integrity technique tailored for cloud computing environments. As part of this journal, I am implementing the proposed RSA (Rivest - Shamir - Adleman) algorithm. In comparison to the DES (Data Encryption Standard) algorithm, RSA offers superior security and efficiency. Upon file upload by the data owner, the data is automatically encrypted using the RSA algorithm, thereby bolstering data integrity within the cloud computing framework. when a data owner uploads a file to the cloud, it is automatically encrypted using the RSA algorithm. This encryption process is pivotal in bolstering data integrity within the cloud infrastructure, as it protects against unauthorized manipulation by external threats and unintentional modifications by service providers. By implementing this Enhanced Data Integrity technique, the paper aims to mitigate the risks associated with cloud storage and ensure the security of data in transit and at rest.

References

W. Wang, D. T. Hoang, P. Hu, Z. Xiong, D. Niyato, P. Wang, Y. Wen, andD. I. Kim, ‘‘A survey on consensus mechanisms and mining strategy management in blockchain networks, ’’ IEEE Access, vol.7, pp.22328–22370, 2018.

C. Wang, S. Chen, Z. Feng, Y. Jiang, and X. Xue, ‘‘Block chain - based data audit and access control mechanism in service collaboration, ’’ in Proc. ICWS, Jul.2019, pp.214–218.

Zhu, Y. Yuan, Y. Chen, Y. Zha, W. Xi, B. Jia, and Y. Xin, ‘‘A secure and efficient data integrity verification scheme for based on short signature, ’’ IEEE Access, vol.7, pp.90036–90044, 2019

Bolton, T Dargahi, T.; Belguith, S.; Al - Rakhami, M. S.; Sodhro, A. H. On the Security and Privacy Challenges of Virtual Assistants. Sensors 2021, 21, 2312

Hadisukmana, R. N. An Approach of Securing Data using Combined Cryptography and Steganography. Int. J. Math. Sci. Comput.2020, 6, 1–9.

Ijaz Ahmad Awan, Muhammad Shiraz, Muhammad Usman Hashmi, QaisarShaheen, Rizwan Akhtar, Allah Ditta (2020), Secure framework enhancing AES algorithm in cloud computing Security and communication networks 2020, pp 1 - 16.

Rose Adee, HaralambosMouratidis (2022), ”A dynamic four - step data security model for data in cloud computing based on cryptography and steganography Sensors “22 (3), 1109.

SabaRehman, NidaTalatBajwa, MunamAliShah, AhmadOAseeri, AdeelAnjum (2021), Hybrid AES -ECC model for the security of data over cloud storage Electronics 10 (21), 2673.

Rubika Walia, Prachi Garg Mathematical (2022),” Multi Encryption Approach to Provide Security for Cloud Integrated Internet of Things” Statistician and Engineering Applications 71 (3s2), 1538 - 1544.

Abhishek Kumar, Swarn Avinash Kumar, Vishal Dutt, Ashutosh Kumar Dubey, Sushil Narang (2023),”. A hybrid secure cloud platform maintenance based on improved attribute - based encryption strategies International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI),.

Wang, Z. (2024, August). CausalBench: A Comprehensive Benchmark for Evaluating Causal Reasoning Capabilities of Large Language Models. In Proceedings of the 10th SIGHAN Workshop on Chinese Language Processing (SIGHAN-10) (pp. 143-151).

Yao, J., & Yuan, B. (2024). Optimization Strategies for Deep Learning Models in Natural Language Processing. Journal of Theory and Practice of Engineering Science, 4(05), 80-87.

Wang, Z., Zhu, Y., He, S., Yan, H., & Zhu, Z. (2024). LLM for Sentiment Analysis in E-commerce: A Deep Dive into Customer Feedback. Applied Science and Engineering Journal for Advanced Research, 3(4), 8-13.

Ren, Z. (2024). VGCN: An Enhanced Graph Convolutional Network Model for Text Classification. Journal of Industrial Engineering and Applied Science, 2(4), 110-115.

Xu, X., Yuan, B., Song, T., & Li, S. (2023, November). Curriculum recommendations using transformer base model with infonce loss and language switching method. In 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA) (pp. 389-393). IEEE.

Yao, J., & Yuan, B. (2024). Research on the Application and Optimization Strategies of Deep Learning in Large Language Models. Journal of Theory and Practice of Engineering Science, 4(05), 88-94.

Yuan, B., & Song, T. (2023, November). Structural Resilience and Connectivity of the IPv6 Internet: An AS-level Topology Examination. In Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering (pp. 853-856).

Jiang, L., Yu, C., Wu, Z., & Wang, Y. (2024). Advanced AI framework for enhanced detection and assessment of abdominal trauma: Integrating 3D segmentation with 2D CNN and RNN models. arXiv preprint arXiv:2407.16165.

Xu, Y., Lin, Y.-S., Zhou, X., & Shan, X. (2024). Utilizing emotion recognition technology to enhance user experience in real-time. Computing and Artificial Intelligence, 2(1), 1388. https://doi.org/10.59400/cai.v2i1.1388

Ji, H., Xu, X., Su, G., Wang, J., & Wang, Y. (2024). Utilizing Machine Learning for Precise Audience Targeting in Data Science and Targeted Advertising. Academic Journal of Science and Technology, 9(2), 215-220.

Xu, J., Jiang, Y., Yuan, B., Li, S., & Song, T. (2023, November). Automated Scoring of Clinical Patient Notes using Advanced NLP and Pseudo Labeling. In 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA) (pp. 384-388). IEEE.

Yao, J., & Yuan, B. (2024). Optimization Strategies for Deep Learning Models in Natural Language Processing. Journal of Theory and Practice of Engineering Science, 4(05), 80-87.

Xu, X., Yuan, B., Song, T., & Li, S. (2023, November). Curriculum recommendations using transformer base model with infonce loss and language switching method. In 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA) (pp. 389-393). IEEE.

Wang, Z., Yan, H., Wang, Y., Xu, Z., Wang, Z., & Wu, Z. (2024). Research on autonomous robots navigation based on reinforcement learning. arXiv preprint arXiv:2407.02539.

Yuan, B. (2024). Design of an Intelligent Dialogue System Based on Natural Language Processing. Journal of Theory and Practice of Engineering Science, 4(01), 72-78.

Yuan, B., Song, T., & Yao, J. (2024, January). Identification of important nodes in the information propagation network based on the artificial intelligence method. In 2024 4th International Conference on Consumer Electronics and Computer Engineering (ICCECE) (pp. 11-14). IEEE.

Ren, Z. (2024). Enhanced YOLOv8 Infrared Image Object Detection Method with SPD Module. Journal of Theory and Practice in Engineering and Technology, 1(2), 1–7. Retrieved from https://woodyinternational.com/index.php/jtpet/article/view/42

Yao, J., & Yuan, B. (2024). Research on the Application and Optimization Strategies of Deep Learning in Large Language Models. Journal of Theory and Practice of Engineering Science, 4(05), 88-94.

Ma, Y., Shen, Z., & Shen, J. (2024). Cloud Computing and Hyperscale Data Centers: A Comparative Study of Usage Patterns. Journal of Theory and Practice of Engineering Science, 4(06), 11-19.

Xu, J., Jiang, Y., Yuan, B., Li, S., & Song, T. (2023, November). Automated Scoring of Clinical Patient Notes using Advanced NLP and Pseudo Labeling. In 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA) (pp. 384-388). IEEE.

Yuan, B., & Song, T. (2023, November). Structural Resilience and Connectivity of the IPv6 Internet: An AS-level Topology Examination. In Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering (pp. 853-856).

Yuan, B., Song, T., & Yao, J. (2024, January). Identification of important nodes in the information propagation network based on the artificial intelligence method. In 2024 4th International Conference on Consumer Electronics and Computer Engineering (ICCECE) (pp. 11-14). IEEE.

Downloads

Published

2024-08-29

How to Cite

Sreevibhu, S., & Kumar, T. P. (2024). Application of Integrated RSA Encryption in Remote Data Integrity Check. Journal of Research in Science and Engineering, 6(8), 32–37. https://doi.org/10.53469/jrse.2024.06(08).08