PRESERVING REMOTE DATA INTEGRITY VERIFICATION SECURE WITH IDENTITY BASED AUTHENTICATION FOR A DESIGNATED VERIFIER.

  • Unique Paper ID: 167091
  • Volume: 11
  • Issue: 3
  • PageNo: 473-478
  • Abstract:
  • The approaches for remote data possession checking (RDPC) in the context of cloud-based computing are reviewed, with a focus on the distinctions between public and private verification mechanisms. Identified verifiers are crucial because they allow specific entities to verify data integrity while protecting data privacy. Yanet al. give an example of how existing RDPC systems typically overlook data privacy concerns in favor of public key infrastructure (PKI)-based authentication. To solve these shortcomings, future RDPC solutions should employ advanced cryptographic techniques to ensure secure verification processes that prioritize data privacy in cloud storage environments. These advancements aim to enhance the security and reliability of cloud-based data storage and verification systems by merging robust privacy measures with efficient integrity checks, in line with evolving privacy regulations and user preferences.

Related Articles