Loading

Design Robust Data Integrity Scheme in Cloud Computing Based on Image Histogram and CryptoHash Function
Nadra J. Ali AL-Saad

Nadra Jamil Ali, M.Phil, Department of Computer Science (Sussex Univ. UK) College of Education, Basra University, Basrah, 61004, Iraq.  
Manuscript received on 13 June 2017 | Revised Manuscript received on 20 June 2017 | Manuscript Published on 30 June 2017 | PP: 247-251 | Volume-6 Issue-5, June 2017 | Retrieval Number: E5057066517/17©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud technologies are revolution in computing world which support on demand access to several virtualized customers and servers which are existed outside of data owner’s center. In this computing model, the databases and applications of data owners are arise to the unified large data centers and may be lead to many security issues in the management of data and services. Preserving the secrecy and reliability of the message communicated between the main elements of Cloud considers one of the significant aims of Message Authentication Code (MAC). In this paper, we propose a robust scheme based on image histogram and Crypto-hash function to check the integrity of data message between sender and receiver. This scheme is selected the pixels that located in top peak of histogram to generate more efficient message capacity. As well as, our proposed scheme includes many security features such as resisting the well-known attacks, user’s message anonymity, session key agreement, and data integrity for user’s message. The security analysis proves that the proposed scheme can resist the public security malicious attacks such as Insider attacks, key recovery attack. Finally, our scheme is efficient in terms of performance.
Keywords: Cloud Computing, MAC, Insider attack, MAC, Histogram.

Scope of the Article: Cloud Computing