• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

    2022-08-24 12:57:40StanlyJayaprakashKishoreBalasubramanianRossilawatiSulaimanMohammadKamrulHasanParameshachariandCelestineIwendi
    Computers Materials&Continua 2022年7期

    J.Stanly Jayaprakash, Kishore Balasubramanian, Rossilawati Sulaiman,Mohammad Kamrul Hasan,*, B.D.Parameshachariand Celestine Iwendi

    1Department of CSE, Mahendra Institute of Technology, Namakkal, 637503, India

    2Department of EEE, Dr.Mahalingam College of Engineering and Technology, Pollachi, 642003, India

    3Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM),43600, Bangi, Malaysia

    4Department of Telecommunication Engineering, GSSS Institute of Engineering and Technology for Women,Mysuru, India

    5School of Creative Technologies, University of Bolton, Deane Road, Bolton, United Kingdom

    Abstract: Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changes made in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2-167 ms when compared to the existing Advanced Encryption Standard and Blowfish.

    Keywords: Cloud computing; cloud data storage; cloud service provider;merkle hash tree; multi-owner authentication; third-party auditor

    1 Introduction

    Cloud computing has been adopted in many organizations to store and process data in an efficientmanner and any organizations prefer cloud computing due to its advantages of scalability, flexibility and reliability.Cloud services are the best option for companies for the quick response and the best flexibility[1,2].User outsources the data in the cloud to store and process the data due to its scalability and flexibility.Cloud Service Provider (CSP) has to preserve the privacy of the sensitive data and the user has the option of encrypting the data before uploading in the cloud [3,4].Cloud computing provides virtual computing services to extensive, medium, and little industries and services for example Software as a service(SaaS),Platform as a Service(PaaS),and Infrastructure as a Services(IaaS)[5,6].The improved accessibility and technical advancements are extensively favorable for the deployment of cloud servers for storage and computation.Quality of Services, low cost and stability make a cloud a typical choice for computing-intensive tasks [7,8].Security is amajor problem for the cloud computing system and significant revision of the existing security choices leads to develop modern techniques.Guarantee cloud data security and users access control are the current security issues in the cloud[9,10].A trusted Third-Party Auditor (TPA) is applied to verify the cloud data to reduce the burden on users, this is called public auditing.However, the TPA may have unnecessary access to private information in the auditing process [11,12].

    The receiver node is verified by the sender node in the authentication process.The sender independently generates the encrypted messages in basic authentication and the symmetric key is used in the receiver to match the key [13].Some of the research involves in apply the complex cryptosystem for authentication in a cloud [14].OTP-based authentication [15], authentication mechanism and cryptography algorithm [16-20], Multiple factor-based authentication, anonymous node ID assignment are some types of methods in cloud authentication.Security is the important aspect of cloud services and attacks in the cloud tend to lose of personal information of the users and profit to the company.Data integrity is the way to track the data in the cloud and retrieve the old version to retrieve the affected data easily.Searching is another important aspect of encrypted data and the Cloud needs to support the search process in encrypted data to retrieve the user data securely.Therefore, an efficient method is needed in the cloud to manage security, integrity and search on encrypted data.In this research,the enhanced Merkle hash tree method with multi-owner authentication is proposed to secure data in cloud storage.The enhanced Merkle hash tree method is applied to perform a significant data integrity check in cloud storage.Every node in the Merkle hash tree contains the information of position relative to its parent node.The user obtains a public key from the TPA using an authentication request to download the encrypted data.If the user is authorized, the data owner gives the decryption key to the user to decrypt the encrypted data.

    This research paper is organized as follows: Section 2 surveys several existing research papers on cloud data storage authentication with problem statements.In Section 3, an effective method called the enhanced Merkle hash tree is presented with a multi-owner authentication technique for cloud data storage authentication.Section 4 explains the performance of the proposed method.The conclusion of this research paper is given in Section 5.

    2 Literature Review

    This section reviews recent and significant research approaches suggested by researchers in cloud data storage authentication.A brief evaluation of the essential contributions and main gaps in the existing literature are presented to support the presented proposal.

    Shajina et al.[21] proposed a dual authentication protocol with two level of authentication with the list of precedence-based access control to improve the security and scalability of the cloud.The triple-DES algorithm with the identity of the user was applied as an extra attribute to improve the security in the cloud.The anonymous of the user was protected in this method to improve the security and the proposed method for the multi-owner cloud was verified in multiple scenarios.The verification shows that the proposed method has a lower average network time and high security in the cloud.The developed methodology achieves secure and effective data sharing in dynamic cloud storage.However, the developed methodology provides insecure data sharing as a one-to-one solution and lower efficiency in large datasets.

    Anand et al.[22] proposed Elliptic Curve Digital Signature Algorithm (ECDSA) and Enhanced Elliptic Curve Diffie-Hellman (EECDH) method for mutual authentication in the multi-owner in the cloud.The proposed EECDH method was applied to exchange the secure key to the owners and eliminatethe Man-In-The-Middle(MITM)attack.The proposed method protects the data integrity in the cloud.The identity and attribute-based access policy increases the robustness of the method.The developed cloud computing system still has vulnerabilities, specifically in networks that have several third-party platforms and complex infrastructures.

    Deep et al.[23] applied blockchain technology for secure authentication in the cloud to increases security.Blockchain technology makes it easy for an insider to change the login credential details for the authentication process.The correctness and applicability of the method were tested on the cloud.The Scyther formal system was used to test the proposed method against no reply attack, offline guessing,impersonation and denial of services.The result shows that the proposed method was robust in secure the user information in the cloud.The developed authentication scheme was an open cloud computing system that frequently encountered social engineering and phishing attacks.The integrity check in the model was poor due to the unstructured encryption process in the data.

    Badr et al.[24] proposed an Attribute-based encryption method that considers authority, cloud servers, data users and data owners to secure the data in the cloud.The decryption process was delegated by the data owner to reduce the computational complexity.The MAC encryption text associated with the data stored in the cloud was generated after encryption.The attribute property was applied for the encryption and decryption was based on verification.The various attacks have been applied to test the performance of the developed method.If the number of authentication samples is low, the authentication rate will be reduced.The Attribute-based encryption has a higher overhead for the large database and has lower performance in integrity check.

    Ge et al.[25] developed Accumulative Authentication Tag (AAT) using symmetric key cryptography for the authentication of keywords.The authentication tag was updated based on dynamic operations in the cloud.The secure index consists of a search table based on the orthogonal list and verification list containing AAT.The method updates are based on connectivity and flexibility.The AAT method has lower overhead and lowers computation time during a keyword search than a secure conjunctive keyword search.An analysis showed that the developed method was secure and efficient and the memory usage of the method needs to be reduced for the authentication process to be effective.The AAT methods store the tag method for the encrypted data for integrity and memory usage for the tag is high for the large dataset.

    Zhong et al.[26] developed a mutual authentication and key agreement scheme based on elliptic curve cryptography for the peer-to-peer cloud.The elliptic curve certificate-free cryptography method was used for key generation.This method eliminates the trusted authority and simplifies mathematical operations to increase security.The security correctness of the method was analyzed, and it showed that the method was secure.This proposed method reduces computational and communication costs compared with existing methods.Further development is required to support multi-user access to cloud data securely.

    The existing methods have considerable performance in the encryption of data in the cloud for multi-cloud support.TheDES algorithm [21]method provides the supportmulti-cloud with improved security and has lower efficiency in large datasets.The EECDH [22]method provides the data integrity in the cloud and this method fails to perform in the large dataset due to the attribute-based method.Blockchain technology [23] provides higher security in data transmission and this is not suitable for cloud-stored data.Attribute-basedmethods [24-26] was suitable for cloud storage and lower efficiency in large dataset.Commonly, existing methods have limitations of doesn’t support data integrity or lower efficiency in large datasets.

    3 Problem Statement

    This section describes the problem statement for the Merkle hash tree in cloud data storage authentication and explains how the proposed methodology provides a solution to the described problems.The concerns about the Merkle hash tree approach are detailed as follows:

    Searching theithleaf node in data integrity auditing is computationally complex in the Merkle hash tree approach.If the storage structure is continuous, the number of operations like insertion and deletion are quite high.After performing the deletion and insertion operations, the sequence number of the nodes is likely to be modified, and the height of the tree may become imbalanced [27].

    The Merkle hash tree approach has no function to manage data integrity auditing, which is called empty proof [28].Also, it does not provide any integrity guarantee for the data, because integrity assures that outsourced data is intact.The traditional Merkle hash tree uses either a message digest(MD) or a Secure Hash Algorithm (SHA) as the hash function.Most of the time, these functions do not indicate tree depth, which leads to second preimage attacks.

    Solution: To overcome the above-mentioned drawbacks, an enhanced Merkle hash tree is implemented with a multi-owner authentication methodology to improve the performance of cloud data storage authentication.Here, a new hash function of the tiger tree hash function is replaced with an MD or SHA hash function in the Merkle hash tree.The tiger tree hash method is a truncated version with a specific hash size, so there is no need to distinguish the defined values.It contains a total of 24 rounds, with digest sizes of 128, 160, and 192.The tiger hash function uses 244compression functions in the16thround to avoid equivalent time complexity and uses 248compression functions in the19thround to secure the stored data from a collision attack.A detailed description of multi-owner authentication and an enhanced Merkle hash tree is given in Section 4.

    4 Proposed Methodology

    The proposed methodology is used for data integrity, load balancing, and multi-owner authentication in the cloud environment.A publicly verifiable methodology of enhanced Merkle hash tree with multi-owner authentication is used to protect the integrity of the cloud data and also to support dynamic maintenance.

    4.1 Multi-Owner Authentication

    In this method, a highly securemulti-owner authentication methodology is implemented to secure the cloud server database.Initially, the data are uploaded to the cloud server by the data owner in an encrypted format using an enhanced Merkle hash tree approach.

    The user is provided with a public key for viewing and downloading the data, and the data owner verifies the user (authorized or unauthorized) using the public key.If the user is authorized, then a decryption key is provided by the data owner to the user for decrypting the data.A load balancing concept is also implemented for processing the user-requested job.Finally, the user request is passed to the cloud server.If the user is authenticated, the cloud server replies to the user query.The general design of the cloud data storage is denoted in Fig.1.A brief evaluation of the proposed technique is determined as follows:

    4.2 System Model for Cloud Data Storage

    This sub-section describes the systemmodel shown in Fig.1.Generally, the integrity of cloud dataarchitecture involves the following parties [29-31].

    Data owner

    First, the data owner needs to register on the cloud service provider’s server.After registration,the cloud service provider generates private and public keys and sends the keys to the data owner.The respective data are encrypted based on the Enhanced Merkle Hash tree method and uploaded to the cloud server.The sender encrypts the data using a public key, and only the holder has a private key to decrypt the respective data.

    User

    To access the network, the user needs to initially create an account.After creating the account,the user logs into the account and requests auditing from the cloud service provider.Based on the user request, the cloud service provider will process the task.The network uses programming languages like .NET or Java for communicating with the cloud server.The user can access the requested data by sending a request to the cloud service provider.The enhanced Merkle Hash tree given private key is used by the user to access the cloud data.

    Cloud Service Provider

    TThe cloud service provider makes a combination of hardware and software resources available and delivers flexible online data storage and computing.The cloud service provider stores a large amount of data and alsomanages the authentication of the data owner and users.To process the user-requested job, the cloud server redirects the job to any queue.In the queue, virtual machines are utilized to process user requests.

    Third-Party Auditor

    The TPA is performed on the encrypted cloud data to check the integrity of the data stored in the cloud.Based on the data owner’s request, the TPA audits the data, which are uploaded by the data owner.The TPA needs to register with the cloud server to audit user-requested data.The TPA sends a request to cloud storage to audit the data present in the cloud.The cloud performs a bilinear mapping on the user data and sends the proof to the TPA.The TPA performs a comparison between the user-provided data and the cloud-provided data.The encrypted data is used to protect the privacy of the file.

    Bilinear Mapping

    The bilinear mapping is the preliminary step of encryption to represent the data in mapping form.The cyclic groupGof the data is given as input andeis the bilinear mapped output.Consider a groupGas a gap Diffie-Hellman group with prime orderp.A bilinear map is developed ase:G×G→GT,whereGTis a prime order, multiplicative cyclic group.A usefulehas the following properties:

    Bilinearity-?m,n∈G?e(ma,nb) =e(m,n)ab;

    Non-degeneracy—?m∈G,m0?e(m,m)≠ 1;

    Computability—eshould be efficiently computable.

    Bilinearity is the property of representing the data with a two-dimensional vector, non-degeneracy is the property of data that is degenerated to the original data, and computability is the ability to solve a problem in an effective manner whereaandbare real random numbers.

    4.3 Merkle Hash Tree Approach for Key Generation

    The Merkle Hash tree method is applied to encrypt the data before uploading to the cloud and the Merkle Hash tree method generated private is used to decrypt the data in the cloud.Merkle Hash Tree method stores the table of hash values from the encrypted data in the non-leaf node and leaf node consists of encrypted data with a labeled hash value.This structure of encryption helps to identify the changes in the data related to the leaf node that helps to increases the integrity.Merkle Hash tree method stores the hash value instead of duplicate the whole data in the leaf node and this helps to encrypt the large dataset with less memory.The Merkle hash tree method is a binary tree data structure with leaf nodes integrated at each node.The Merkle hash tree root node is present as the top node, and the leaf nodes consist of data hashes.Root node authentication provides access to the leaf nodes’integrity declaration.A Merkle hash tree with eight leaf nodes is shown in Fig.2 [28].Bilinearly mapped cloud data is used for encryption based on the Merkle hash tree method.The advantage of using the Merkle Hash tree is that it effectively verifies the data in the distributed system using hash values.In the Merkle Hash tree, a node is denoted,Ni,jwereiandjare theithlevel andjthlevel of the node.The cryptographic variableHi,jstores nodeNi,j, and the nodes at level 0 are called“l(fā)eaves.”The leaves describe the data stored in the tree.In the case of revocation, the leaves that have been revoked are represented by a certificate set Φ that has been revoked, as shown in Eq.(1).

    where,cjis the data stored in leafN0,jandH0,jis computed as in Eq.(2).

    where,his a one-way hash function.

    To build the Merkle hash tree, adjacent nodes settat a given leveli(Ni,j,Ni,j+1,...,Ni,j+t-1) are combined into one node at the upper level that is denoted byNi+Ni+1,k.Then,Hi+1,kiis measured by applyinghto the concatenation of thetcryptographic variables, as in Eq.(3).

    Figure 2: Eight leaf nodes Merkel hash tree

    At the top level, one node is present and is denoted as “root”;Hroota digest for all the data storedin the Merkle hash tree.

    For a file blockmi, a leaf node is used to computehi=H(mi), and a parent node ofN1andN2is constructed asNp= {H(h1||h2)}.A leaf node ofAuxiliary Authentication Information (AAI)Ωiis a set of hash values selected from each of its upper levels so that the root valueRcan be computed{mi,Ωi}.

    For example, the data owner asks the auditor for data integrity verification at one position.The auxiliary informationAI(d[1]):{(HD,R),H(d[1]),(H(d[2]),R),(HB,R)} is provided by the data owner to the auditor.Then, the rootHRis generated by the auditor as follows,

    MeasureHD←(H(d[1])||H(d[2]));

    MeasureHA←(HC||HD);

    Determine the rootHRoot←(HA||HB).

    The root node authenticity is verified to automatically authenticate all the blocks.Each node consists of two pieces of information, such as the hash value and the relative index.The Merkle hash tree method consists of three stages, namely the set-up stage, challenge-prove stage, and update stage.An explanation of each stage is given as follows:

    Set-up Stage

    The set-up stage involves system initialization at the client end.This stage consists of three functions.

    Key generation (1key): The probabilistic key generation method {skey,pkey} is used and the input is thekeysecurity parameter.The input is the private keyskey, and the output is the public keypkey.The public keypkeyis published by the data owner and the private keyskeyis kept safe for decrypting the respective data.

    Tag generationskey,pkey,m→meta data: The client document input metadata is,skey,pkey,mand the client stores locally the output metadata tags δ.The client remotely stores the respective documentsmand tag δ at the server end.

    Block-sig-generation: Once the tag documents δ are generated, the data owner uses the cryptographic hash function to generate signatures for each data block.Generally, either MD or SHA is used as the hash function.

    Challenge-Prove Stage

    The challenge-prove stage is an interaction between client and server.The client identifies the problem and sends challenges to the server.The server analyzes the respective issues and sends output to the client.The challenge-prove stage involves three processes.

    Gen-challenge(C)→{chal}: The input for this process is the client’s private parameterc, and the output is challengechalfor future queries.

    Gen-proof ((ps,m,δ,chal)→{G}: The input is a documentm, metadata δ, public parametersps,and challengechal, and the outputGis given to the user for server verification.

    Check-proof (pkey,chal,meta,data,G)→ {“reject”,“accept”}: This process is used for target document server possession check.The input is the user public keypkey, metadata δ, challengechal,and evidenceG.The evidenceGis analyzed, and the function returns“accept”or“reject.”

    Updated stage

    In the Merkle hash tree, the update stage is a verification process for supporting dynamic data operations.The function of this stage is explained as follows:

    Perform-update (pkey,m,δ,update)→{m′,δ′,Gupdate}: After the server receives theupdaterequirementfrom the client, this operation is performed.The input for this process is a documentm,metadata δ, public keypkey, and the update.The output for future checking consists of a new tag δ′, updated documentm′, and updated evidenceGupdate.

    Verify-update (pkey,update,metadata,Gupdate)→ {(metadata′,“accept”),“reject”}: This process checks the correctness of the dynamic operation at the server end, and verifies the client.The update triggers the verification function, and the input is metadata δ, public keypkey, andGupdate.If the update evaluates correctly, it returns“accept”and retains the metadata locally, or the process returns“reject.”The Merkle hash tree protocol supports the data dynamic process and the public auditing of data.Still, a few major flaws in the Merkle hash tree protocol are detailed in Section 3.To overcome these issues, an enhanced Merkle hash tree approach is developed in this research study.

    4.4 Enhanced Merkle Hash Tree Approach

    This sub-section describes the enhanced Merkle hash tree approach.In this proposed technique,a new hash function (tiger tree hash function) is used in a Merkle hash tree instead of the MD or SHA hash function.In the tiger hash function, the one-way compression function operates on 64-bit words,where it processes 8 words of data and maintains 3 words of state.In total, the tiger hash function includes 24 rounds, using a combination of operations like S-box lookups, rotate, and XOR (addition and subtraction).An effective, intricate scheduling key technique is used to derive keys in 24 rounds from the 8 input words.This operation makes the implementation easy in a microcontroller and other hardware.A sample binary tiger hash tree is shown in Fig.3.

    Finally, the TPA audits the data requested by the data owner using the enhanced Merkle hash tree approach.The TPA updates the auditing information at a certain time, so the security of the data is ensured.Also, the auditor updates the data owner if any change occurs while the data are being audited.

    Figure 3: Sample binary tiger hash tree structure

    5 Experimental Result and Discussion

    This section provides a detailed description of the experimental set-up of the proposed method,and a measure of its performance.The performance is analyzed with comparative and qualitative analyses.

    5.1 Experimental Set-Up

    The proposed approach was experimentally tested usingNet-Beans (version 8.2) with 4GB RAMa 3.0 GHz Intel i3 processor, a 500 GB hard disc, and MY-SQL server as a cloud service provider.To estimate the effectiveness of the proposed methodology, the proposed approach of enhanced Merkle hash tree with multi-owner authentication performance was compared with several existing approaches: Advanced Encryption Standard (AES) and Blowfish [6].In this study, the performance of the proposed approach was compared in terms of encryption time, memory usage, and decryption time.

    5.2 Discussion

    This section discusses the comparison between the proposed approach and other key assignment approaches in terms of a few characteristics, and it details the compression ratio for dissimilar tree heights and delegation ratios.Tab.1 presents a comparison of five key assignment approaches with different properties such as decryption key size, cipher-text size, encryption type, and file classification relationship.Tab.1 shows that most of the encryption types of the existing methods are based on the public key, decryption key size is constant, cipher size is constant and irrelevant to the data.Constant cipher size is vulnerable to attacks and data is easily accessed with common attacks.Encryption of the existing methods is irrelevant to the File classification and integrity check for the data is difficult.Therefore, the proposed Merkle Hash tree method cipher size is inconstant to make it difficult for attacks and integrity check is carried out easily due to the encryption is based on File classification.

    Generally, the communication overhead and information leakage risk increase with a greater number of delegation decryption keys.In existing key assignment schemes (symmetric-key encryption,key-aggregate encryption [26], etc.), the decryption key generation depends on previous classification files.When a new file class is uploaded to the cloud server, the whole classification structure must be changed in these methods.The proposed method generates an inconstant ciphertext size and a constant decryption key size.This is relevant to file classification and supports the incessant updating of files.

    Table 1: Characteristics of a proposed and existing method

    The proposed method is evaluated with dissimilar key sizes and the delegation ratio in Tab.2 and it clearly shows that the delegation keyDkeyincreases with the increase in the delegation ratio.

    Table 2: Delegation ratio and dissimilar tree height comparison

    5.3 Encryption and Decryption Time Analysis

    The encryption and decryption of the proposed method are analyzed in this section.For experimental analysis, ten different file sizes are considered, such as 83.3KB, 108KB, 249KB, 333KB,416 KB, 1370 KB, 2740 KB, 5480 KB, 10003 KB, and 15483 KB.The existing methods carried out the encryption to encrypt the data with tags in the unstructured format that reduces the capacity to handle the large data.The Merkle has a tree encryption process involves in creating the hash for the data,store the hash value in the table and apply labels to encrypted data.This structured process decreases the encryption time of the Merkle Hash Tree method and the hash value in the table reduces the decryption time in a large dataset.The encryption and decryption times of the proposed and existing methods are shown in Tab.4.The average encryption time of the proposed method (enhanced Merkle hash tree with multi-owner authentication) is 132.9 msec.The existing methodologies (AES and Blowfish [6]) achieved average encryption times of 300.4 msec and 215.4 msec.The graphical comparison of encryption time is shown in Fig.4.

    Table 3: Proposed approach evaluation using encryption and decryption time

    Table 4: Proposed method memory usage analysis

    Correspondingly, the average decryption time of the proposed methodology is 32.5 msec; for the existing methodologies, the average encryption times are 34.4 msec and 91 msec.The comparison of decryption time is shown in Fig.5 and the performance analysis of the proposed and existing methods is shown in Tab.3.The encryption and decryption time show that the proposed method achieves higher performance for cloud data storage authentication than previous methods.

    Figure 4: Encryption time of the proposed method

    Figure 5: Graphical representation of decryption time comparison

    AES [32] is a symmetric Feistel block cipher protocol that utilizes a similar key for both the decryption and encryption processes.This protocol contains fourteen rounds and only accepts a block size of 128 bits.By choice, it contains another two keys with a length of 192 and 256 bits and variable rounds of 10 and 12, respectively.

    Blowfish [33] is another Feistel symmetric structure algorithm that consists of a 64-bit block size,which varies from 32 to 448 bits with 16 rounds.Also, the Blowfish algorithm contains a large keydependent box for encryption, and it uses 4 S-boxes for decryption.In this algorithm, the level of security depends on the size of the key.The Blowfish algorithm is easily affected by the different key attacks because several rounds are used as a masker key that makes the algorithm infeasible [34,35].

    5.4 Quantitative Analysis for Memory Usage

    The memory usage of the proposed and existing methods is analyzed in this section.In Tab.4,the proposed approach (enhanced Merkle hash tree with multi-owner authentication) outperforms existing methods with an average memory usage of 7,107,722.6 KB.The existing methods duplicate the encrypted data with the tag that increases the computation time and memory of the cloud.The proposed Merkle Hash Tree method stores the hash value in the data for the search process and encrypted data is applied with a label.The hash value and label require less memory than unstructured encrypted data.The memory usage averages of the existing methods AES and Blowfish [6] are 54,573,308.1 KB and 28,185,164.8 KB.Tab.4 shows that the proposed enhanced Merkle hash tree with multi-owner authentication method performed effectively compared with the existing methods.The memory usage graphical comparison is represented in Fig.6.

    Figure 6: Graphical representation of memory usage comparison

    After inspecting Tabs.3 and 4, it was determined that the tiger hash function-based Merkle hash tree approach shows better performance in terms of memory usage, encryption time, and decryption time, whereas Blowfish is the second-best algorithm for cloud data storage authentication.

    The running times of the proposed and existing methods [25,26] are shown in Fig.7.The AAT[25] requires more computational time than the enhanced Merkle hash tree with a multi-owner authentication method due to the generation of tags in the method, and the elliptic curve cryptography method [26] requires a greater computational time.The proposed method requires less computation due to the tiger hash method.

    Figure 7: The user side running time of the proposed method

    The server-side runtime of the enhanced Merkle hash tree is compared with the existing methods,as shown in Fig.8.The AAT [25] requires greater computational time on the server-side to analyze the tags,and the elliptic curve cryptography method [26] requires more time for the decryption process.The tiger hash tree in the Merkle method reduces the decryption process on the server-side.The proposed enhanced Merkle hash tree method has a server-side runtime of 8.14 ms, and the AAT [26] method requires 10.88 ms of runtime.This shows that the proposed enhanced Merkle hash tree method has a lower computation time than the existing methods.

    Figure 8: The server-side runtime of the proposed Method

    6 Conclusion

    In the current decade, the cloud computing paradigm has become standard for computer services due to its flexible computational abilities and high storage capacity.In this article, a new authentication methodology is presented to further ensure the security of cloud data storage.An enhanced Merkle hash tree with a multi-owner authentication technique is used for cloud data security.The enhanced Merkle hash tree approach algorithm encrypts user data and stores it in the cloud.The stored data is retrieved using a decryption function based on a user query.The proposed multi-owner cloud authentication method delivers an effective performance compared with other approaches for cloud data storage authentication.The experimental analysis shows that the proposed enhanced Merkle hash tree method has lower memory usage and lower encryption and decryption times.The proposed methodology saves between 2 and 167 msec of encryption and decryption time over existing methods(AES and Blowfish).In future work, a secure relevant data retrieval approach based on elliptic curve cryptography is incorporated in the cloud data storage application to increase the resilience against various attacks.

    Author Contributions:The paper investigation, resources, data curation, writing—original draft preparation, writing—review and editing, and visualization were done by J.S.and K.B.The paper conceptualization, software, validation, and formal analysis were done by C.I., S.C.N, R.S, M.K.H.Methodology, supervision, project administration, and final approval of the version to be published were conducted by A.S.C:I and B.D.P.All authors have read and agreed to the published version of the manuscript.

    Funding Statement:The Universiti Kebangsaan Malaysia (UKM) Research Grant Scheme FRGS/1/2020/ICT03/UKM/02/6 and GGPM-2020-028 funded this research.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    97人妻精品一区二区三区麻豆| 久久久久免费精品人妻一区二区| 欧美精品啪啪一区二区三区| 我的老师免费观看完整版| 亚洲精品一区av在线观看| 国产成人欧美在线观看| 亚洲片人在线观看| 亚洲精品456在线播放app | 色视频www国产| 三级国产精品欧美在线观看| 操出白浆在线播放| 97碰自拍视频| 成人性生交大片免费视频hd| 动漫黄色视频在线观看| 黄片大片在线免费观看| 午夜福利在线观看免费完整高清在 | 精品国产美女av久久久久小说| 色视频www国产| av中文乱码字幕在线| 老司机午夜福利在线观看视频| 亚洲成人精品中文字幕电影| 亚洲成人久久爱视频| 12—13女人毛片做爰片一| 少妇人妻精品综合一区二区 | 法律面前人人平等表现在哪些方面| 男女做爰动态图高潮gif福利片| 精品日产1卡2卡| 一二三四社区在线视频社区8| 九九在线视频观看精品| 日韩欧美国产在线观看| av在线天堂中文字幕| 国产一级毛片七仙女欲春2| 美女 人体艺术 gogo| 九色成人免费人妻av| 亚洲人成网站在线播放欧美日韩| 亚洲人成伊人成综合网2020| 国产精品一区二区三区四区久久| 国产伦在线观看视频一区| 毛片女人毛片| 免费观看人在逋| 18禁黄网站禁片免费观看直播| 亚洲 欧美 日韩 在线 免费| 好看av亚洲va欧美ⅴa在| 亚洲一区高清亚洲精品| 精品一区二区三区视频在线 | 日本免费a在线| 国产高清视频在线播放一区| 无限看片的www在线观看| 久久久久精品国产欧美久久久| 欧美日韩福利视频一区二区| 国产一区二区亚洲精品在线观看| 三级国产精品欧美在线观看| 精品久久久久久,| 人人妻人人澡欧美一区二区| 色综合站精品国产| 在线看三级毛片| 草草在线视频免费看| 夜夜看夜夜爽夜夜摸| 欧美一级a爱片免费观看看| 午夜激情欧美在线| 精品免费久久久久久久清纯| 日韩成人在线观看一区二区三区| 成年版毛片免费区| www.熟女人妻精品国产| 亚洲精品久久国产高清桃花| 亚洲激情在线av| 国产一区二区三区视频了| 国产色爽女视频免费观看| 麻豆国产av国片精品| 免费电影在线观看免费观看| 1000部很黄的大片| 好看av亚洲va欧美ⅴa在| 在线播放国产精品三级| 国产精品久久视频播放| 18禁黄网站禁片免费观看直播| 国产精品国产高清国产av| 校园春色视频在线观看| 国产美女午夜福利| 我要搜黄色片| 欧美午夜高清在线| 全区人妻精品视频| 麻豆一二三区av精品| 午夜精品在线福利| 美女黄网站色视频| 免费看美女性在线毛片视频| 日本免费一区二区三区高清不卡| 亚洲成av人片在线播放无| 亚洲av不卡在线观看| 国产成人欧美在线观看| 1024手机看黄色片| 欧美在线一区亚洲| 亚洲av美国av| 色在线成人网| 每晚都被弄得嗷嗷叫到高潮| 韩国av一区二区三区四区| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 亚洲av二区三区四区| 97超视频在线观看视频| 久久精品亚洲精品国产色婷小说| 免费人成在线观看视频色| 亚洲国产精品久久男人天堂| 亚洲欧美激情综合另类| 99riav亚洲国产免费| 狠狠狠狠99中文字幕| 超碰av人人做人人爽久久 | 精品久久久久久久毛片微露脸| 宅男免费午夜| 2021天堂中文幕一二区在线观| 免费无遮挡裸体视频| 天堂av国产一区二区熟女人妻| 国产高清三级在线| 又爽又黄无遮挡网站| 精品一区二区三区视频在线 | 国产又黄又爽又无遮挡在线| 亚洲第一欧美日韩一区二区三区| 一级黄片播放器| 国产真实乱freesex| 欧美成人一区二区免费高清观看| 搡老妇女老女人老熟妇| 国产免费av片在线观看野外av| 欧美av亚洲av综合av国产av| 精品国产三级普通话版| 国产午夜福利久久久久久| 少妇熟女aⅴ在线视频| 亚洲一区二区三区不卡视频| 脱女人内裤的视频| 日本三级黄在线观看| 亚洲成av人片免费观看| 亚洲欧美一区二区三区黑人| 亚洲精品国产精品久久久不卡| 男女午夜视频在线观看| 亚洲人成网站在线播放欧美日韩| 一个人看视频在线观看www免费 | 国产精品久久久久久精品电影| 亚洲av成人不卡在线观看播放网| 国产99白浆流出| 变态另类成人亚洲欧美熟女| 欧美乱色亚洲激情| 9191精品国产免费久久| 可以在线观看毛片的网站| 国产伦精品一区二区三区四那| 天堂av国产一区二区熟女人妻| 国产色婷婷99| 免费在线观看日本一区| 精品久久久久久久久久久久久| 精品日产1卡2卡| 桃色一区二区三区在线观看| 久久久色成人| 亚洲欧美激情综合另类| 热99re8久久精品国产| 最近在线观看免费完整版| 亚洲五月婷婷丁香| 青草久久国产| 好男人在线观看高清免费视频| av女优亚洲男人天堂| 久久久色成人| 在线观看午夜福利视频| 夜夜爽天天搞| 免费观看的影片在线观看| 精品欧美国产一区二区三| 日韩有码中文字幕| tocl精华| 色精品久久人妻99蜜桃| 欧美zozozo另类| 搡老妇女老女人老熟妇| 色播亚洲综合网| 久久久色成人| 最新在线观看一区二区三区| 99久久综合精品五月天人人| 99久久综合精品五月天人人| 国产成人啪精品午夜网站| 日本一本二区三区精品| 欧美大码av| 久久国产精品人妻蜜桃| 啦啦啦观看免费观看视频高清| 亚洲成av人片在线播放无| 两性午夜刺激爽爽歪歪视频在线观看| 日韩精品中文字幕看吧| 国产欧美日韩精品一区二区| 可以在线观看毛片的网站| 人人妻人人看人人澡| 国产色婷婷99| 亚洲人成网站高清观看| 亚洲国产精品久久男人天堂| 天堂影院成人在线观看| 午夜精品一区二区三区免费看| 免费人成在线观看视频色| 免费av观看视频| 麻豆一二三区av精品| 91在线观看av| 搞女人的毛片| 99久久精品国产亚洲精品| 男女做爰动态图高潮gif福利片| 一级a爱片免费观看的视频| 亚洲自拍偷在线| 2021天堂中文幕一二区在线观| 亚洲成人精品中文字幕电影| 两个人的视频大全免费| 亚洲精品在线美女| 亚洲精品一卡2卡三卡4卡5卡| 亚洲va日本ⅴa欧美va伊人久久| 亚洲av成人不卡在线观看播放网| 1000部很黄的大片| av天堂在线播放| 午夜免费成人在线视频| 男人舔女人下体高潮全视频| 国产欧美日韩精品亚洲av| 男女之事视频高清在线观看| 在线观看午夜福利视频| 在线免费观看不下载黄p国产 | 国产免费一级a男人的天堂| 97碰自拍视频| 美女免费视频网站| 国产高清视频在线观看网站| 国产一区二区亚洲精品在线观看| 日日干狠狠操夜夜爽| tocl精华| 色尼玛亚洲综合影院| 久久久久国产精品人妻aⅴ院| 日本黄大片高清| 美女大奶头视频| 丰满人妻一区二区三区视频av | 黄片大片在线免费观看| 欧美成狂野欧美在线观看| 老司机午夜福利在线观看视频| 淫妇啪啪啪对白视频| 亚洲欧美日韩东京热| 亚洲人成网站在线播放欧美日韩| 日韩精品青青久久久久久| www.999成人在线观看| 少妇裸体淫交视频免费看高清| 国产精华一区二区三区| 国产日本99.免费观看| 日本一本二区三区精品| 在线十欧美十亚洲十日本专区| 91久久精品电影网| 九九久久精品国产亚洲av麻豆| 亚洲狠狠婷婷综合久久图片| 俺也久久电影网| 蜜桃亚洲精品一区二区三区| 亚洲av成人精品一区久久| 天天一区二区日本电影三级| 91久久精品电影网| 99久久精品热视频| 黄色视频,在线免费观看| 丝袜美腿在线中文| 无人区码免费观看不卡| 国产高清videossex| 好看av亚洲va欧美ⅴa在| 麻豆久久精品国产亚洲av| 一级a爱片免费观看的视频| 久久久国产精品麻豆| 日本 欧美在线| 桃色一区二区三区在线观看| 精品一区二区三区av网在线观看| 又黄又粗又硬又大视频| 亚洲专区中文字幕在线| 高清日韩中文字幕在线| 免费大片18禁| 欧美日韩福利视频一区二区| 亚洲国产精品久久男人天堂| 日日摸夜夜添夜夜添小说| 国语自产精品视频在线第100页| 日本五十路高清| 长腿黑丝高跟| 免费看十八禁软件| 最新在线观看一区二区三区| 欧美另类亚洲清纯唯美| 精品久久久久久,| 男女午夜视频在线观看| 日本精品一区二区三区蜜桃| 国模一区二区三区四区视频| 啪啪无遮挡十八禁网站| 给我免费播放毛片高清在线观看| 狂野欧美激情性xxxx| 国产精品电影一区二区三区| 香蕉久久夜色| 亚洲精品在线美女| 亚洲美女视频黄频| 深爱激情五月婷婷| 一本一本综合久久| 精品久久久久久成人av| 午夜视频国产福利| av天堂中文字幕网| 亚洲乱码一区二区免费版| 久久精品影院6| 性色avwww在线观看| 老司机午夜十八禁免费视频| 亚洲avbb在线观看| 欧美一级a爱片免费观看看| 又黄又爽又免费观看的视频| 成人国产一区最新在线观看| 老汉色av国产亚洲站长工具| 日韩高清综合在线| 国产精品久久电影中文字幕| 18+在线观看网站| 在线观看66精品国产| 国产 一区 欧美 日韩| 欧美乱色亚洲激情| 91久久精品电影网| avwww免费| 免费大片18禁| 久9热在线精品视频| 国产成人啪精品午夜网站| 内射极品少妇av片p| 国产av在哪里看| 亚洲av免费在线观看| 国产精品 国内视频| 蜜桃亚洲精品一区二区三区| 少妇的逼水好多| 老汉色∧v一级毛片| 欧美午夜高清在线| 国产高清有码在线观看视频| 两人在一起打扑克的视频| 中文字幕久久专区| 黄色日韩在线| 成人国产一区最新在线观看| 美女高潮喷水抽搐中文字幕| 日本 欧美在线| 欧洲精品卡2卡3卡4卡5卡区| 看片在线看免费视频| 亚洲精品一卡2卡三卡4卡5卡| 午夜福利18| 欧美性猛交黑人性爽| 午夜老司机福利剧场| 亚洲人成网站在线播| 日韩精品中文字幕看吧| 人人妻人人澡欧美一区二区| 天天添夜夜摸| 亚洲人成电影免费在线| 午夜久久久久精精品| 午夜福利在线观看免费完整高清在 | 国产伦在线观看视频一区| 精品一区二区三区视频在线观看免费| 五月伊人婷婷丁香| 日韩欧美免费精品| 国产视频内射| 国产精品99久久久久久久久| 日产精品乱码卡一卡2卡三| 国产亚洲午夜精品一区二区久久 | 少妇猛男粗大的猛烈进出视频 | 卡戴珊不雅视频在线播放| 亚洲国产精品成人综合色| 国产精品一区www在线观看| 天堂影院成人在线观看| 日韩视频在线欧美| 又爽又黄a免费视频| 欧美97在线视频| a级一级毛片免费在线观看| 国产精品1区2区在线观看.| 国产精品福利在线免费观看| 国产一区亚洲一区在线观看| 精品久久久精品久久久| 国产v大片淫在线免费观看| 成人午夜精彩视频在线观看| 国产免费福利视频在线观看| 亚洲怡红院男人天堂| 国产av国产精品国产| 免费看av在线观看网站| 中文资源天堂在线| 午夜福利高清视频| 国产精品日韩av在线免费观看| 中文乱码字字幕精品一区二区三区 | av在线老鸭窝| 人人妻人人澡人人爽人人夜夜 | 免费播放大片免费观看视频在线观看| 嫩草影院新地址| 久热久热在线精品观看| www.av在线官网国产| 精华霜和精华液先用哪个| 超碰av人人做人人爽久久| 在线免费十八禁| 天堂网av新在线| 最近中文字幕2019免费版| 美女国产视频在线观看| 亚洲四区av| 午夜视频国产福利| 欧美精品一区二区大全| 夫妻午夜视频| 免费黄色在线免费观看| 国产欧美日韩精品一区二区| 麻豆久久精品国产亚洲av| 国产成人精品婷婷| 熟女人妻精品中文字幕| 精品国内亚洲2022精品成人| 大话2 男鬼变身卡| 一级片'在线观看视频| 一本一本综合久久| 精品久久久久久久人妻蜜臀av| 亚洲av中文av极速乱| 91久久精品国产一区二区三区| videossex国产| 精品99又大又爽又粗少妇毛片| 亚洲无线观看免费| 中文欧美无线码| 国产黄片视频在线免费观看| 国产乱来视频区| 免费大片黄手机在线观看| 少妇被粗大猛烈的视频| 午夜福利在线观看吧| 免费黄频网站在线观看国产| 国产女主播在线喷水免费视频网站 | 精品久久国产蜜桃| 99久久精品国产国产毛片| 欧美97在线视频| 中文字幕av成人在线电影| 国产精品爽爽va在线观看网站| 成人性生交大片免费视频hd| 亚洲性久久影院| 久久精品久久久久久噜噜老黄| 久久久久九九精品影院| av专区在线播放| 街头女战士在线观看网站| 99久久人妻综合| 免费看光身美女| 久久久久精品久久久久真实原创| 欧美日韩国产mv在线观看视频 | 亚洲av国产av综合av卡| 亚洲精品久久午夜乱码| 亚洲国产精品国产精品| 人妻夜夜爽99麻豆av| 搡老乐熟女国产| 亚洲久久久久久中文字幕| 全区人妻精品视频| 男女边吃奶边做爰视频| a级毛色黄片| 亚洲av二区三区四区| 日韩三级伦理在线观看| 麻豆乱淫一区二区| 看十八女毛片水多多多| 亚洲精品色激情综合| 日韩一区二区三区影片| 欧美激情久久久久久爽电影| 色吧在线观看| 日韩 亚洲 欧美在线| 搞女人的毛片| 我的女老师完整版在线观看| 最近的中文字幕免费完整| 国产精品一区二区三区四区免费观看| 国产 亚洲一区二区三区 | 禁无遮挡网站| 少妇的逼水好多| av免费在线看不卡| 亚洲成人久久爱视频| 久久久久精品性色| 亚洲精品国产av蜜桃| 国产有黄有色有爽视频| 搡老乐熟女国产| 亚洲美女搞黄在线观看| 人妻夜夜爽99麻豆av| 久久综合国产亚洲精品| 午夜福利成人在线免费观看| 精品不卡国产一区二区三区| 免费观看a级毛片全部| 久久精品久久精品一区二区三区| 亚洲国产精品国产精品| 国内少妇人妻偷人精品xxx网站| av在线天堂中文字幕| 丝瓜视频免费看黄片| 久久久久久九九精品二区国产| 欧美性感艳星| av黄色大香蕉| 国产精品久久久久久久电影| 青春草亚洲视频在线观看| 精品久久久久久久久久久久久| 精品人妻偷拍中文字幕| 啦啦啦中文免费视频观看日本| 高清在线视频一区二区三区| 熟女电影av网| 乱人视频在线观看| 老师上课跳d突然被开到最大视频| 亚洲精品视频女| 成人无遮挡网站| 亚洲精华国产精华液的使用体验| 日韩精品有码人妻一区| 成年人午夜在线观看视频 | 国内精品美女久久久久久| 在线观看美女被高潮喷水网站| 国产大屁股一区二区在线视频| 亚洲精品久久久久久婷婷小说| 一级毛片我不卡| 日日摸夜夜添夜夜添av毛片| 亚洲一级一片aⅴ在线观看| 成年免费大片在线观看| 日本-黄色视频高清免费观看| 久久99热这里只频精品6学生| 啦啦啦韩国在线观看视频| eeuss影院久久| 99热6这里只有精品| 久久久久久久久久人人人人人人| 乱人视频在线观看| 真实男女啪啪啪动态图| 中文欧美无线码| 国内精品宾馆在线| 国产探花极品一区二区| 又粗又硬又长又爽又黄的视频| 如何舔出高潮| 中文字幕av成人在线电影| 亚洲国产精品成人综合色| 80岁老熟妇乱子伦牲交| 丰满人妻一区二区三区视频av| 99热全是精品| 亚洲第一区二区三区不卡| 欧美性感艳星| 午夜精品一区二区三区免费看| 男人舔女人下体高潮全视频| 三级毛片av免费| 久久久久久久久久人人人人人人| 听说在线观看完整版免费高清| 免费黄频网站在线观看国产| 亚洲熟女精品中文字幕| 成人av在线播放网站| 插逼视频在线观看| 18禁在线无遮挡免费观看视频| 欧美激情国产日韩精品一区| 九色成人免费人妻av| 色尼玛亚洲综合影院| 国产午夜精品久久久久久一区二区三区| 一本一本综合久久| 久久久久久久久久人人人人人人| 国产亚洲最大av| 在线观看人妻少妇| 黄片无遮挡物在线观看| 51国产日韩欧美| 国产精品久久久久久久电影| 91在线精品国自产拍蜜月| 亚洲丝袜综合中文字幕| 亚州av有码| 内地一区二区视频在线| 国产亚洲5aaaaa淫片| 男人爽女人下面视频在线观看| 免费av不卡在线播放| 国产亚洲午夜精品一区二区久久 | 日本黄色片子视频| 国产爱豆传媒在线观看| 欧美成人a在线观看| 麻豆成人av视频| 亚洲精品乱久久久久久| 午夜精品国产一区二区电影 | 中文字幕免费在线视频6| 日韩一本色道免费dvd| 国产精品熟女久久久久浪| 99久久九九国产精品国产免费| 18禁在线播放成人免费| 在线 av 中文字幕| 波野结衣二区三区在线| 搡老妇女老女人老熟妇| 欧美变态另类bdsm刘玥| 免费不卡的大黄色大毛片视频在线观看 | 女的被弄到高潮叫床怎么办| 免费看a级黄色片| 在线 av 中文字幕| 久久久久久久久久人人人人人人| 免费看美女性在线毛片视频| 免费人成在线观看视频色| 精品午夜福利在线看| 中文在线观看免费www的网站| 美女主播在线视频| 麻豆乱淫一区二区| 免费观看av网站的网址| 国产黄a三级三级三级人| 日本一二三区视频观看| 午夜福利视频1000在线观看| 一级毛片久久久久久久久女| 国产精品国产三级国产av玫瑰| 亚洲欧美成人综合另类久久久| 亚洲精品乱码久久久久久按摩| 日产精品乱码卡一卡2卡三| 成人无遮挡网站| 亚洲,欧美,日韩| 有码 亚洲区| 99久久精品一区二区三区| 免费不卡的大黄色大毛片视频在线观看 | 直男gayav资源| 精品国产三级普通话版| 人妻系列 视频| 边亲边吃奶的免费视频| 2021少妇久久久久久久久久久| 亚洲成色77777| 丝袜美腿在线中文| 伊人久久精品亚洲午夜| 在线观看美女被高潮喷水网站| 中文字幕av在线有码专区| 亚洲国产欧美人成| 久久久久久久久久成人| 精品久久久久久久久av| 午夜精品一区二区三区免费看| 美女国产视频在线观看| 国产在视频线在精品| 26uuu在线亚洲综合色| 亚洲精品456在线播放app| 国产精品无大码| 亚洲成人一二三区av| 久久久午夜欧美精品| 日韩 亚洲 欧美在线| 精品一区二区三区人妻视频| 毛片女人毛片| 高清午夜精品一区二区三区| 插阴视频在线观看视频| 熟女电影av网| 18禁裸乳无遮挡免费网站照片| 亚洲色图av天堂| 丰满少妇做爰视频| 亚洲成人av在线免费| 大片免费播放器 马上看| 99视频精品全部免费 在线| 国模一区二区三区四区视频| h日本视频在线播放| 亚洲高清免费不卡视频| 欧美最新免费一区二区三区| 啦啦啦中文免费视频观看日本| 亚洲性久久影院| 国产高清有码在线观看视频| 久久久久免费精品人妻一区二区| 99九九线精品视频在线观看视频|