PRESERVING REMOTE DATA INTEGRITY VERIFICATION SECURE WITH IDENTITY BASED AUTHENTICATION FOR A DESIGNATED VERIFIER.

  • Unique Paper ID: 167091
  • Volume: 11
  • Issue: 3
  • PageNo: 473-478
  • Abstract:
  • The approaches for remote data possession checking (RDPC) in the context of cloud-based computing are reviewed, with a focus on the distinctions between public and private verification mechanisms. Identified verifiers are crucial because they allow specific entities to verify data integrity while protecting data privacy. Yanet al. give an example of how existing RDPC systems typically overlook data privacy concerns in favor of public key infrastructure (PKI)-based authentication. To solve these shortcomings, future RDPC solutions should employ advanced cryptographic techniques to ensure secure verification processes that prioritize data privacy in cloud storage environments. These advancements aim to enhance the security and reliability of cloud-based data storage and verification systems by merging robust privacy measures with efficient integrity checks, in line with evolving privacy regulations and user preferences.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{167091,
        author = {P.Bhanumathi and P.Deepthi and R.Jyosna Devi},
        title = {PRESERVING REMOTE DATA INTEGRITY VERIFICATION SECURE  WITH IDENTITY BASED AUTHENTICATION FOR A DESIGNATED VERIFIER.},
        journal = {International Journal of Innovative Research in Technology},
        year = {2024},
        volume = {11},
        number = {3},
        pages = {473-478},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=167091},
        abstract = {The approaches for remote data possession checking (RDPC) in the context of cloud-based computing are reviewed, with a focus on the distinctions between public and private verification mechanisms. Identified verifiers are crucial because they allow specific entities to verify data integrity while protecting data privacy. Yanet al. give an example of how existing RDPC systems typically overlook data privacy concerns in favor of public key infrastructure (PKI)-based authentication. To solve these shortcomings, future RDPC solutions should employ advanced cryptographic techniques to ensure secure verification processes that prioritize data privacy in cloud storage environments. These advancements aim to enhance the security and reliability of cloud-based data storage and verification systems by merging robust privacy measures with efficient integrity checks, in line with evolving privacy regulations and user preferences.},
        keywords = {Data dynamics, Identity-based Cryptography, Designated Verifier. },
        month = {August},
        }

Related Articles