Open Access iconOpen Access



Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3,*, B. D. Parameshachari4, Celestine Iwendi5

1 Department of CSE, Mahendra Institute of Technology, Namakkal, 637503, India
2 Department of EEE, Dr. Mahalingam College of Engineering and Technology, Pollachi, 642003, India
3 Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600, Bangi, Malaysia
4 Department of Telecommunication Engineering, GSSS Institute of Engineering and Technology for Women, Mysuru, India
5 School of Creative Technologies, University of Bolton, Deane Road, Bolton, United Kingdom

* Corresponding Author: Mohammad Kamrul Hasan. Email: email

(This article belongs to the Special Issue: Next - Generation Secure Solutions for Wireless Communications, IoT and SDNs)

Computers, Materials & Continua 2022, 72(1), 519-534.


Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily identifies the changes made in the data due to proper structure. The developed model supports privacy-preserving public auditing to provide a secure cloud storage system. The data owners upload the data in the cloud and edit the data using the private key. An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches. The data files requested by the data owner are audit by a third-party auditor and the multi-owner authentication method is applied during the modification process to authenticate the user. The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish.


Cite This Article

APA Style
Jayaprakash, J.S., Balasubramanian, K., Sulaiman, R., Hasan, M.K., Parameshachari, B.D. et al. (2022). Cloud data encryption and authentication based on enhanced merkle hash tree method. Computers, Materials & Continua, 72(1), 519-534.
Vancouver Style
Jayaprakash JS, Balasubramanian K, Sulaiman R, Hasan MK, Parameshachari BD, Iwendi C. Cloud data encryption and authentication based on enhanced merkle hash tree method. Comput Mater Contin. 2022;72(1):519-534
IEEE Style
J.S. Jayaprakash, K. Balasubramanian, R. Sulaiman, M.K. Hasan, B.D. Parameshachari, and C. Iwendi "Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method," Comput. Mater. Contin., vol. 72, no. 1, pp. 519-534. 2022.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1925


  • 934


  • 0


Share Link