HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment

Individuals and IT organizations have begun to profit from cloud providers such as Amazon Web Services, Google Cloud Platform, Microsoft Azure, and others based on their demand provisioning of IaaS, PaaS, and SaaS resources, with a pay-as-you-go pricing model. Among these services, the data storage...

Full description

Saved in:
Bibliographic Details
Published inThe Journal of supercomputing Vol. 79; no. 3; pp. 3181 - 3209
Main Authors Kumar, P. Hari, AnandhaMala, G. S.
Format Journal Article
LanguageEnglish
Published New York Springer US 01.02.2023
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0920-8542
1573-0484
DOI10.1007/s11227-022-04714-x

Cover

More Information
Summary:Individuals and IT organizations have begun to profit from cloud providers such as Amazon Web Services, Google Cloud Platform, Microsoft Azure, and others based on their demand provisioning of IaaS, PaaS, and SaaS resources, with a pay-as-you-go pricing model. Among these services, the data storage in the cloud plays a vital and most sensitive role. According to our research, the proper deployment of novel methods can greatly reduce vendor lock-in. We present a dynamic identity-based system that provides a multi-copy based on many cloud storage servers to reduce vendor lock-in issues. With respect to multi-homomorphic verifiable tags, several copies are provided to multiple cloud storage servers for user data storage. The system's security has been demonstrated in accordance with the K center Diffie Hellman (KCDH) algorithm. Additionally, cloud computing data integrity auditing and block hashing merging are conducted. Furthermore, two data centers based on a secure networking protocol (SNP) are provided for developing efficient cloud storage methods for dynamic data. The proposed HMAC-Rijndael framework's performance was evaluated using the airport dataset and found to be superior to existing encryption approaches in terms of various performance criteria. As a result, the proposed system provides improved security.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0920-8542
1573-0484
DOI:10.1007/s11227-022-04714-x