Maintaining Integrity for Shared Data In Cloud With Ring Signatures

Abstract

The wild success of cloud data services bring the cloud commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information—identity privacy—to public verifiers. In this paper, we propose a novel privacypreserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when auditing shared data integrity.

Authors and Affiliations

N. Nagamani| M.Tech (CSE), Nimra Women’s College Of Engineering, A.P., India, Dr. Syed Sadat Ali| Associate Professor, Dept. of Computer Science & Engineering, Nimra College of Engineering and Technology(NCET), A.P., India

Keywords

Related Articles

An Explorative Study On Quarry Dust Blended Geo Polymer Concrete For Various Concentrations Of Alkaline Activated Solution

Cement is the most generally utilized development material on the planet and Ordinary Portland Cement (OPC) is the real fixing utilized as a part of cement. The generation of bond discharges huge measure of carbon di...

Digital Signature and Key Agreement

Diffie Hellman key exchange protocol is the most commonly used protocol. This protocol is used to exchange keys in a network. But it has bit m to exchange keys over a network but it has some drawbacks. This is the fi...

An Additive Order And Privacy Preserving Function Family (AOPPF)

The plentiful benefits of cloud computing, for privacy concerns, individuals and enterprise users are disinclined to outsource their susceptible data, including emails, personal health records and government confiden...

A Novel DiDrip Protocol with Dissemination-Privilege Pair Authentication

It is an attempt to enhance the DiDrip protocol. There are some efficiency problems caused by the generation, transmission, and verification of certificates. First, it is not efficient in communication, as the certif...

A New Algorithm for Distributed Generator (DG) Placement and Sizing for Distribution Systems

In today’s distribution grids the number of distributed generation units is increasing rapidly. Combined heat and power (CHP) plants and wind turbines are most often installed. Integration of these DG units into th...

Download PDF file
  • EP ID EP16515
  • DOI -
  • Views 296
  • Downloads 10

How To Cite

N. Nagamani, Dr. Syed Sadat Ali (2015). Maintaining Integrity for Shared Data In Cloud With Ring Signatures. International Journal of Science Engineering and Advance Technology, 3(7), 280-284. https://europub.co.uk/articles/-A-16515