EAM: Enhanced authentication method to ensure the authenticity and integrity of the data in VM migration to the cloud environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.1.29Keywords:
Data migration, Data authentication, Authenticity, Data integrity, Cloud security, Hashing.cDimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud is a prominent technology today to provide computing resources to users. In previous days, industries or enterprise users are maintaining their data on-premises. Therefore, it creates many management issues in the industries. Cloud gives solutions to industries to maintain their data in the cloud data center. As a result, many industries are outsourcing their data to the cloud. When outsourcing, the data are migrated along with Virtual Machines (VM). During the migration, the data are vulnerable to attack. As a result, the data may tamper with fault content by the adversarial. Therefore, it is necessary to maintain data authenticity and integrity verification during the migration. This paper proposes an authentication mechanism to verify the data authenticity when migrated from on-premises to off-premises. The paper proposes a novel procedure to migrate the data in the virtual machine. After migration, the data is verified for authenticity using the proposed mechanism. An enhanced hashing procedure is proposed in the paper to verify the data authenticity. The proposed authentication mechanism is simulated in the cloud environment, and results are given in the tables and graphs. The results show that the EAM efficiently provides authentication and integrity of data migrated from on-premises to the cloud data center.Abstract
How to Cite
Downloads
Similar Articles
- Abhishek K Pandey, Amrita Sahu, Ajay K Harit, Manoj Singh, Nutritional composition of the wild variety of edible vegetables consumed by the tribal community of Raipur, Chhattisgarh, India , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Sampa Mondal, Nilanjana Chatterjee, Baibaswata Bhattacharjee, Positive impact of using α-Fe2O3 nanoparticles as dietary supplements on some hematological parameters of an economically important minor carp Labeo bata (Hamilton, 1822) , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Dattatraya Pandurang Rane, Amey Adinath Choudhari, Rita Kakade, Technology-driven financial inclusion: Opportunities for corporate expansion in emerging markets , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sadhana Gaikwad, Rajvardhan, Overview on biased news reporting of Indian television with legal aspect , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- M. Merla Agnes Mary, S. Britto Ramesh Kumar, DAJO: A Robust Machine Learning–Based Framework for Preprocessing and Denoising Fetal ECG Signals , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- S. Jerinrechal, I. Antonitte Vinoline, Sustainable Inventory Model for Temperature-Dependent Deteriorating Products under Condition Monitoring , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Parwez Ahmad, Md Jamaluddin, Estimation of Some Heavy Metal Estimation at Sites of Saryug River as Lateral Tributary of the Ganga in Northern Bihar , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- Mahima Srivastava, Chemical facets of environment-friendly corrosion impediment of low-carbon steel in aqueous solutions of inorganic mineral acid , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- K. R. R. Prakash, Kishore Kunal, Designing information systems for business administration through human and computer interaction , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 31 32 33 34 35 36 37 38 39 40 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper

