Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 23
Page No. 4916 - 4925

Enhancing Data Security Through Block Level Data Integrity Assurance using Diagonal Based Rotational Technique on Cloud Storage

Authors : P. Premkumar and D. Shanthi


Akshay, C., 2014. Cloud computing. Asian J. Manage. Sci., 2014: 01-06.

Coppersmith, D., 1994. The data encryption standard (DES) and its strength against attacks. IBM. J. Res. Dev., 38: 243-250.
CrossRef  |  Direct Link  |  

Diffie, W. and M.E. Hellman, 1976. New directions in cryptography. IEEE Trans. Inform. Theory, 22: 644-654.
CrossRef  |  Direct Link  |  

Ghaeb, J.A., M.A. Smadi and J. Chebil, 2011. A high performance data integrity assurance based on the determinant technique. Future Gener. Comput. Syst., 27: 614-619.
Direct Link  |  

Govinda, K., V. Gurunathaprasad and H. Sathishkumar, 2012. Third party auditing for secure data storage in cloud through digital signature using RSA. Int. J. Adv. Sci. Tech. Res., 4: 525-530.

Kahate, A., 2013. Cryptography and Network Security. 3rd Edn., Tata McGraw-Hill Education, New Dehli, India, ISBN: 978--25-902988-2, Pages: 492.

Kumar, M.A., 2014. Integrity check mechanism in cloud using SHA-512 algorithm. Int. J. Eng. Comput. Sci., 3: 6033-6037.
Direct Link  |  

Nie, T. and T. Zhang, 2009. A study of DES and Blowfish encryption algorithm. Proceedings of the IEEE Region 10 Conference TENCON, January 23-26, 2009, Singapore, pp: 1 4-.

Premkumar, P. and D. Shanthi, 2014. An efficient dynamic data violation checking technique for data integrity assurance in cloud computing. Int. J. Innovative Res. Sci. Eng. Technol., 3: 2649-2654.
Direct Link  |  

Schneier, B., 1993. Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In: Fast Software Encryption. Anderson, R. (Ed.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-58108-6, pp: 191-204.

Schneier, B., 1994. The blowfish encryption algorithm. Dr. Dobbs J. Software Tools Prof. Programmer, 19: 38-43.

Stallings, W., 2006. Cryptography and Network Security: Principles and Practices. 3rd Edn., Pearson Education India, New Dehli, India, ISBN: 978-1-25-902988-2, Pages: 492.

Wang, C., Q. Wang, K. Ren and W. Lou, 2010. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of the IEEE INFOCOM, March 14-19, 2010, San Diego, CA., USA., pp: 1-9.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved