HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment
Individuals and IT organizations have begun to profit from cloud providers such as Amazon Web Services, Google Cloud Platform, Microsoft Azure, and others based on their demand provisioning of IaaS, PaaS, and SaaS resources, with a pay-as-you-go pricing model. Among these services, the data storage...
        Saved in:
      
    
          | Published in | The Journal of supercomputing Vol. 79; no. 3; pp. 3181 - 3209 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        New York
          Springer US
    
        01.02.2023
     Springer Nature B.V  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0920-8542 1573-0484  | 
| DOI | 10.1007/s11227-022-04714-x | 
Cover
| Summary: | Individuals and IT organizations have begun to profit from cloud providers such as Amazon Web Services, Google Cloud Platform, Microsoft Azure, and others based on their demand provisioning of IaaS, PaaS, and SaaS resources, with a pay-as-you-go pricing model. Among these services, the data storage in the cloud plays a vital and most sensitive role. According to our research, the proper deployment of novel methods can greatly reduce vendor lock-in. We present a dynamic identity-based system that provides a multi-copy based on many cloud storage servers to reduce vendor lock-in issues. With respect to multi-homomorphic verifiable tags, several copies are provided to multiple cloud storage servers for user data storage. The system's security has been demonstrated in accordance with the K center Diffie Hellman (KCDH) algorithm. Additionally, cloud computing data integrity auditing and block hashing merging are conducted. Furthermore, two data centers based on a secure networking protocol (SNP) are provided for developing efficient cloud storage methods for dynamic data. The proposed HMAC-Rijndael framework's performance was evaluated using the airport dataset and found to be superior to existing encryption approaches in terms of various performance criteria. As a result, the proposed system provides improved security. | 
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
| ISSN: | 0920-8542 1573-0484  | 
| DOI: | 10.1007/s11227-022-04714-x |