Affiliation:
1. Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education , Manipal – 576104 , Karnataka , India
Abstract
Abstract
In today’s rapidly evolving digital landscape, the urgency to secure data within expansive cloud storage systems has reached unprecedented levels. Conventional remote storage methods, while widely used, are inherently vulnerable to security breaches, corruption, and tampering. Recognizing this critical challenge, a state-of-the-art protocol has emerged to address these vulnerabilities head-on. This innovative solution integrates a sophisticated binary search tree (BST) structure with elliptic curve cryptography, ensuring not only efficient data retrieval but also robust encryption mechanisms. The protocol goes further by meticulously computing secure hashing algorithm hash values to verify the integrity of files, leaving no room for unauthorized modifications or tampering attempts. A thorough comprehensive benchmarking analysis has been conducted comparing this protocol with established techniques such as Rivest, Shamir, Adleman encryption and doubly linked list-based index table structures. The findings reveal that the proposed protocol outperforms these conventional methods, showcasing superior security features and computational efficiency. Remarkably, the proposed method reduces overheads by an impressive 5%, making it a highly favorable choice for both businesses and academic institutions. This marks a significant advancement toward fortified data security in cloud environments, contributing substantially to the ongoing discourse on secure data storage and management.
Reference44 articles.
1. Gartner. Gartner Forecasts Worldwide Public Cloud End-UserSpending to Grow 23% in 2021; [Cited 02 May 2022]. https://www.gartner.com/en/newsroom/press-releases/2021-04-2-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-grow-23-percent-in-2021.
2. egnyte.com Data Auditing. [Cited 26 April 2021]. https://www.egnyte.com/guides/governance/data-auditing.
3. Erway CC, Küpçü A, Papamanthou C, Tamassia R. Dynamic provable data possession. ACM Trans Inform Syst Security. 2015 Apr;17(4):1–29. 10.1145/2699909.
4. Wang Q, Wang C, Ren K, Lou W, Li J. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distributed Syst. 2011;22(5):847–59.
5. Zhu Y, Ahn G, Hu H, Yau SS, An HG, Hu C. Dynamic audit services for outsourced storages in clouds. IEEE Trans Services Comput. 2013;6(2):227–38.