Extensive Security and Performance Analysis Shows the Proposed Schemes Are Provably Secure and Highly Efficient

Journal Title: International Journal of Engineering and Science Invention - Year 2017, Vol 6, Issue 6

Abstract

In this paper, we utilize the public key based homomorphism authenticator and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient. We also show how to extent our main scheme to support batch auditing for TPA upon delegations from multi-users.

Authors and Affiliations

Mr. Kandunuri Ramakrishna, Mr. Rokesh Kumar Y, Mr. U. Rakesh

Keywords

Related Articles

Persistence of a Generalized Prey-Predator Model with Prey Reserved and Herd Behavior of Prey in Unreserved Zone, Where Both Side Prey Migration Rate Is Predator's Density Dependent Function

In this article we analyze a generalized prey-predator system with a reserved zone and herd behaviour of prey species in the unreserved zone. Here we assume that the habitat is divided into two zones, namely free zone an...

An Inverse Transient Thermoelastic Behavior of Circular Plate by Using Marchi-Fasulo and Laplace Integral Transform

This article concerned with study of exact solution of deflection of inverse transient thermoelastic thin circular plate occupying the space 2 2 D x y z r x y a h z h : ( , , ) | 0 , with the stated boundary conditions....

A Road to Efficient Power Optimization System

In today’s era saving electricity is a very important topic of concern. Many times it has been observed that in college’s classroom, the appliances of the classroom are left on even when the classroom is vacant, so there...

Free Space Optical Networks: A Survey

Optical wireless networks, also known as Free Space Optical (FSO) networks have emerged as a promising solution for future high speed networks, and for broadband wireless communications. The range of the potential applic...

Download PDF file
  • EP ID EP402997
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

Mr. Kandunuri Ramakrishna, Mr. Rokesh Kumar Y, Mr. U. Rakesh (2017). Extensive Security and Performance Analysis Shows the Proposed Schemes Are Provably Secure and Highly Efficient. International Journal of Engineering and Science Invention, 6(6), 14-19. https://europub.co.uk/articles/-A-402997