EAM: Enhanced authentication method to ensure the authenticity and integrity of the data in VM migration to the cloud environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.1.29Keywords:
Data migration, Data authentication, Authenticity, Data integrity, Cloud security, Hashing.cDimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud is a prominent technology today to provide computing resources to users. In previous days, industries or enterprise users are maintaining their data on-premises. Therefore, it creates many management issues in the industries. Cloud gives solutions to industries to maintain their data in the cloud data center. As a result, many industries are outsourcing their data to the cloud. When outsourcing, the data are migrated along with Virtual Machines (VM). During the migration, the data are vulnerable to attack. As a result, the data may tamper with fault content by the adversarial. Therefore, it is necessary to maintain data authenticity and integrity verification during the migration. This paper proposes an authentication mechanism to verify the data authenticity when migrated from on-premises to off-premises. The paper proposes a novel procedure to migrate the data in the virtual machine. After migration, the data is verified for authenticity using the proposed mechanism. An enhanced hashing procedure is proposed in the paper to verify the data authenticity. The proposed authentication mechanism is simulated in the cloud environment, and results are given in the tables and graphs. The results show that the EAM efficiently provides authentication and integrity of data migrated from on-premises to the cloud data center.Abstract
How to Cite
Downloads
Similar Articles
- Bhavya Sathenapalli, Kali Charan Sabat, Unleashing entrepreneurial spirit: Driving innovation and growth in a rapidly changing world , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Rakesh Thakur, Surender Singh, The Pangwala People of Pangi Region: Ethnography of Rituals and Ceremonies , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- G. C. Sowparnika, D. A. Vijula, Modeling and control of boiler in thermal power plant using model reference adaptive control , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Geeta S. Desai, Santosh Hajare, Sangeeta Kharde, Evaluation of health practices among individuals with non-alcoholic fatty liver disease: A randomized controlled trial , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Brigith Gladys L, J. Merline Vinotha, Sustainable rough multi-objective two-stage solid transportation problem of third-party e-commerce logistic providers with conditional fixed parameter on safety , The Scientific Temper: Vol. 16 No. 01 (2025): The Scientific Temper
- Payal Saxena, Sustainable finance – A master key to sustainable development , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- M. Deepika, I Antonitte Vinoline, Optimization of an Advanced Integrated Inventory Model Considering Shortages and Deterioration across Varying Demand Functions , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Bhaskarjyoti Talukdar, Bandana Sharma, Prognostic Factors and Survival Outcomes in Esophageal Cancer Patients from North-East India: A Hospital-Based Cohort Study Using Log-Rank Test and Binary Logistic Regression Analysis , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Rashmi Rani, ROLE OF NEUROTICISM AND EXTRAVERSION FACTORS OF PERSONALITY ON LIFE SATISFACTION IN MARRIED COUPLES , The Scientific Temper: Vol. 8 No. 1&2 (2017): The Scientific Temper
- C. S. Manikandababu, V. Rukkumani, Advanced VLSI-based digital image contrast enhancement: A novel approach with modified image pixel evaluation logic , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
<< < 36 37 38 39 40 41 42 43 44 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper

