Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

    J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3,*, B. D. Parameshachari4, Celestine Iwendi5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 519-534, 2022, DOI:10.32604/cmc.2022.021269 - 24 February 2022

    Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient… More >

Displaying 1-10 on page 1 of 1. Per Page