Loading

Enabling Public Auditing for Data Integrity Checking using Ring Signatures Developed with Aes in Cyber Security
J. Achyuth Sai1, K. Kiran Kumar2

1J.Achyuth Sai, Professor, Department, of ECM, Koneru Lakshmaiah Education Foundation Vaddeswaram, Guntur (Andhra Pradesh), India.
2K.Kiran Kumar, Professor, Department, of ECM, Koneru Lakshmaiah Education Foundation Vaddeswaram, Guntur (Andhra Pradesh), India.
Manuscript received on 07 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript published on 30 April 2019 | PP: 1536-1543 | Volume-8 Issue-6, April 2019 | Retrieval Number: F4040048619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now a days in our day to day life online data has most importance. Everything in todays world is connected to internet and mostly communication is carried through online only in the form of gmail, twitter, whatsapp, facebook etc., So, we need this data to be stored and transferred in a secure way without any manipulation and data misuse by the hackers. So, this online data is to be properly encrypted and transferred by using proper algorithms like Advanced encryption standard (AES) algorithm in cyber security. Public auditing is used as an efficient way of checking the data integrity who can verify the metadata of the original data for errors with the request of the user. Homomorphic authenticators are used as metadata for auditing purpose.
Keyword: Advanced Encryption Standard (AES),Data Encryption Standard (DES) Algorithm, Homomorphic Authenticators, Metadata.
Scope of the Article: Streaming Data