EAM: Enhanced authentication method to ensure the authenticity and integrity of the data in VM migration to the cloud environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.1.29Keywords:
Data migration, Data authentication, Authenticity, Data integrity, Cloud security, Hashing.cDimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud is a prominent technology today to provide computing resources to users. In previous days, industries or enterprise users are maintaining their data on-premises. Therefore, it creates many management issues in the industries. Cloud gives solutions to industries to maintain their data in the cloud data center. As a result, many industries are outsourcing their data to the cloud. When outsourcing, the data are migrated along with Virtual Machines (VM). During the migration, the data are vulnerable to attack. As a result, the data may tamper with fault content by the adversarial. Therefore, it is necessary to maintain data authenticity and integrity verification during the migration. This paper proposes an authentication mechanism to verify the data authenticity when migrated from on-premises to off-premises. The paper proposes a novel procedure to migrate the data in the virtual machine. After migration, the data is verified for authenticity using the proposed mechanism. An enhanced hashing procedure is proposed in the paper to verify the data authenticity. The proposed authentication mechanism is simulated in the cloud environment, and results are given in the tables and graphs. The results show that the EAM efficiently provides authentication and integrity of data migrated from on-premises to the cloud data center.Abstract
How to Cite
Downloads
Similar Articles
- Rajeev P. R., K. Aravinthan, A novel approach for metrics-based software defect prediction using genetic algorithm , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Muhammed Jouhar K. K., Dr. K. Aravinthan, An improved social media behavioral analysis using deep learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- R. Gomathi, Balaji V, Sanjay R. Pawar, Ayesha Siddiqua, M. Dhanalakshmi, Ravi Rastogi, Ensuring ethical integrity and bias reduction in machine learning models , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Kanwar D Singh, Rashmi Ashtt, Barriers to last mile connectivity: The role of crime in metro station accessibility , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Rajni Mathur, Bharti Singh, Anjali Kalse, Veena R. Kolte, Saloni Desai, Sameer Sonawane, Examining the impact of economic cycles on India’s information technology sector , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Ravi Kumar P, C. Gowri Shankar, Optimizing power converters for enhanced electric vehicle propulsion: A novel research methodology , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sabana Backer, Prasanth A.P, The influence of attitude on green-cosmetics purchase intention (pi) in central Kerala , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Bajeesh Balakrishnan, Swetha A. Parivara, E-HRM: Learning approaches, applications and the role of artificial intelligence , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Samara Ahmed, Adil E. Rajput, Denial, acceptance and intervention in society regarding female workplace bullying - A mental health study on social media , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 26 27 28 29 30 31 32 33 34 35 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper

