CFP last date
22 April 2024
Reseach Article

Data Auditing in Cloud Environment using Message Authentication Code

Published on January 2013 by K. Govinda, E. Sathiyamoorthy
Emerging Technology Trends on Advanced Engineering Research - 2012
Foundation of Computer Science USA
ICETT - Number 1
January 2013
Authors: K. Govinda, E. Sathiyamoorthy
c2a7acfd-9f9d-4cb2-a2ab-f886ac030b76

K. Govinda, E. Sathiyamoorthy . Data Auditing in Cloud Environment using Message Authentication Code. Emerging Technology Trends on Advanced Engineering Research - 2012. ICETT, 1 (January 2013), 26-28.

@article{
author = { K. Govinda, E. Sathiyamoorthy },
title = { Data Auditing in Cloud Environment using Message Authentication Code },
journal = { Emerging Technology Trends on Advanced Engineering Research - 2012 },
issue_date = { January 2013 },
volume = { ICETT },
number = { 1 },
month = { January },
year = { 2013 },
issn = 0975-8887,
pages = { 26-28 },
numpages = 3,
url = { /proceedings/icett/number1/9828-1006/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Technology Trends on Advanced Engineering Research - 2012
%A K. Govinda
%A E. Sathiyamoorthy
%T Data Auditing in Cloud Environment using Message Authentication Code
%J Emerging Technology Trends on Advanced Engineering Research - 2012
%@ 0975-8887
%V ICETT
%N 1
%P 26-28
%D 2013
%I International Journal of Computer Applications
Abstract

Cloud computing can be defined as a platform which provides different users an opportunity to store their data in the cloud. This data can be retrieved by any of the users or the service provider of that cloud. Data integrity is one of the major aspects of cloud computing services that prevails in a cloud environment. A cloud user needs to consider about data integrity apart from the confidentiality of data , that is data is not modified or corrupted by the service provider or other users. In this paper, we are going to propose a method to ensure data integrity in cloud environment. We will assure that the data in the cloud has not been altered by using Message Authentication Code (MAC).

References
  1. T. Mather, S. Kumarasuwamy, S. Latif ," Cloud Security and Privacy ",O'Rielly
  2. J. W. Rittinghouse, J. F. Ransome,"Cloud Computing :Implementation, Management and Security" CRC Press.
  3. Rescorla,E. ,"Diffie –Hellman Key Agreement Method",RFC 2631,IETF Network Working Group.
  4. Atul Kahate,"Cryptography and Network Security".
  5. American Bankers Association, Keyed Hash Message Authentication Code, ANSI X9. 71, Washington, D. C. , 2000.
  6. National Institute of Standards and Technology, Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication 140-2, May 25, 2001.
  7. H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force, Request for Comments (RFC) 2104, February 1997.
  8. http://cs. uccs. edu/~gsc/pub/master/bbaker/doc/final_paper_bbaker_cs592. doc.
  9. P. Mell and T. Grance, "Draft NIST working definition of cloud computing," Referenced on June. 3rd, 2009 Online at http://csrc. nist. gov/groups/SNS/cloud-computing/index. html, 2009.
  10. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb 2009.
  11. Ian F. Blake and Theo Garefalakis, On the complexity of the Discrete Logarithm and Di_e-Hellman problems, Journal of Complexity 20 (2004), 148–170.
  12. Li Xin, An Improvement of Diffie-Hellman Protocol, Network & Computer Security, 2007,12, pp. 22–23.
Index Terms

Computer Science
Information Sciences

Keywords

Integrity Cloud Mac Xor Diffie-hellman.