Research Article

An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment

Algorithm 1

Hybrid Cloud Security Algorithm.
Input: Outsource field (),
Output: Response of TPA (TRUE or FALSE) ()
()    Initialize domain parameters ()
()    Begin
()    Choose a point in elliptic curve ().
()    Select pseudorandom number as a secret key .
()    Public key      // Key pair generation
()    Select the random number within the range ()
()    Hash value of message blocks
()    Random point
()    Calculate
() Calculate
               // Signature set creation
() Generate block tag for each block
() Client generates Index Hash Table (IHT) with server oriented parameters , , and AAI ()
() Generate hash table IHT
() Unique hash value () = record in index Hash Table ).
() = difference between existing and new entries in IHT
() If ()
() Update the hash value in table
() Else
() Goto step ()
() end       // Proof generation
() Check and
() if (check ≠ )
() terminate the process
() else
()
() If ()
() output = error
() else
()
() if (temp == σ)
() = TRUE
() else
() = FALSE
() end       // Proof verification
() if ( = TRUE)
() = blooming(message, integer, hash value)
() else
() Goto step ()
() end