Distributed Verifiable Data Control in Cloud Storage
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Data integrity, Data Confidentiality is the main vital role in cloud storage. It allows the users to verify the outsourced data is kept intact without downloading the whole data. In Most of the area the clients have to store their data on multi cloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifier’s cost. From the two points, we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multicloud storage. The formal system model and security model are given. Based on the bilinear pairings, a concrete IDDPDP protocol is designed. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational Diffie-Hellman) problem. In addition to the structural advantage of elimination of certificate management, our ID-DPDP protocol is also efficient and flexible. Based on the client’s authorization, the proposed ID-DPDP protocol can realize private verification, delegated verification, and public verification.
Authors and Affiliations
D. Maryleela, M. S. Vijayakumar
Design and Analysis of Archimedes Wind Turbine
wind energy is relatively mature technology with enormous potential for commercial. With high efficient, solid and reliable wind turbine, wind power offers a solution to meet energy needs and environmental care. This is...
Numerical Modeling and Comparative Analysis with Experimental Study of Four Stoke CI Engine using Preheated Neem Bio Diesel
Compression ignition engines are used in many areas to support the logistical activities associated with industry. Diesel powered locomotives and heavy-duty trucks move unprocessed commodities, chemicals, intermediate m...
Enhanced Data Forensics Technique Based On Parallel Processing and Multilevel File Binning
Data forensic comes from forensic science. Forensic science is the scientific method of gathering and examining information about the past. This is especially important in law enforcement where forensics is done in rela...
Computational Simulation of Ahmed Body with Varying Nose radius, Ground height & Rear Slant angle
The CFD analysis is used to analyze the complex flow behavior, flow separation and drag around the body. For this study, a simplified Ahmed body is considered as a test body which is commonly used in industry. Ahmed bod...
Analysis of CNR Penalty in Radio over Fiber System Including the Effect of Phase Noise & RF Oscillator
To analysis of the system performance based on photocurrent at the photo detector. A carrier to noise i.e. CNR is used, for the evaluation of the performance of the Radio over fiber system, because it is a good & simple...