Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment

    A. Ramachandran1,*, P. Ramadevi2, Ahmed Alkhayyat3, Yousif Kerrar Yousif4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2055-2070, 2023, DOI:10.32604/iasc.2023.032942

    Abstract Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly convenient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentication process. Blockchain technology is utilized in this study to enable… More >

  • Open Access

    ARTICLE

    Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

    J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3,*, B. D. Parameshachari4, Celestine Iwendi5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 519-534, 2022, DOI:10.32604/cmc.2022.021269

    Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily… More >

Displaying 1-10 on page 1 of 2. Per Page