Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{167091, author = {P.Bhanumathi and P.Deepthi and R.Jyosna Devi}, title = {PRESERVING REMOTE DATA INTEGRITY VERIFICATION SECURE WITH IDENTITY BASED AUTHENTICATION FOR A DESIGNATED VERIFIER.}, journal = {International Journal of Innovative Research in Technology}, year = {2024}, volume = {11}, number = {3}, pages = {473-478}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=167091}, abstract = {The approaches for remote data possession checking (RDPC) in the context of cloud-based computing are reviewed, with a focus on the distinctions between public and private verification mechanisms. Identified verifiers are crucial because they allow specific entities to verify data integrity while protecting data privacy. Yanet al. give an example of how existing RDPC systems typically overlook data privacy concerns in favor of public key infrastructure (PKI)-based authentication. To solve these shortcomings, future RDPC solutions should employ advanced cryptographic techniques to ensure secure verification processes that prioritize data privacy in cloud storage environments. These advancements aim to enhance the security and reliability of cloud-based data storage and verification systems by merging robust privacy measures with efficient integrity checks, in line with evolving privacy regulations and user preferences.}, keywords = {Data dynamics, Identity-based Cryptography, Designated Verifier. }, month = {August}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry