Open Access iconOpen Access

ARTICLE

crossmark

Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3,*, B. D. Parameshachari4, Celestine Iwendi5

1 Department of CSE, Mahendra Institute of Technology, Namakkal, 637503, India
2 Department of EEE, Dr. Mahalingam College of Engineering and Technology, Pollachi, 642003, India
3 Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600, Bangi, Malaysia
4 Department of Telecommunication Engineering, GSSS Institute of Engineering and Technology for Women, Mysuru, India
5 School of Creative Technologies, University of Bolton, Deane Road, Bolton, United Kingdom

* Corresponding Author: Mohammad Kamrul Hasan. Email: email

(This article belongs to the Special Issue: Next - Generation Secure Solutions for Wireless Communications, IoT and SDNs)

Computers, Materials & Continua 2022, 72(1), 519-534. https://doi.org/10.32604/cmc.2022.021269

Abstract

Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily identifies the changes made in the data due to proper structure. The developed model supports privacy-preserving public auditing to provide a secure cloud storage system. The data owners upload the data in the cloud and edit the data using the private key. An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches. The data files requested by the data owner are audit by a third-party auditor and the multi-owner authentication method is applied during the modification process to authenticate the user. The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish.

Keywords


Cite This Article

J. Stanly Jayaprakash, K. Balasubramanian, R. Sulaiman, M. Kamrul Hasan, B. D. Parameshachari et al., "Cloud data encryption and authentication based on enhanced merkle hash tree method," Computers, Materials & Continua, vol. 72, no.1, pp. 519–534, 2022. https://doi.org/10.32604/cmc.2022.021269



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1867

    View

  • 899

    Download

  • 0

    Like

Share Link