Maintaining Integrity for Shared Data In Cloud With Ring Signatures
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 7
Abstract
The wild success of cloud data services bring the cloud commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information—identity privacy—to public verifiers. In this paper, we propose a novel privacypreserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when auditing shared data integrity.
Authors and Affiliations
N. Nagamani| M.Tech (CSE), Nimra Women’s College Of Engineering, A.P., India, Dr. Syed Sadat Ali| Associate Professor, Dept. of Computer Science & Engineering, Nimra College of Engineering and Technology(NCET), A.P., India
Token Based Fair Queuing Algorithms for Wireless Networks
Token Based Fair Queuing (TBFQ) algorithm has been proposed for single carrier Time Division Multiple Access (TDMA) systems, to suit WINNER Orthogonal Frequency Division Multiple Access (OFDMA) air-interface. This al...
A new Adaptation in Bridgeless Interleaved Power Factor Correction design for High Efficiency
Seeking the requirements of world’s energy conversions, developments are tracked. The research and development of the AC-DC conversion circuit for variable frequency control, which is closely related to human life....
To Achieve Perfect Resilience To Packet Loss In Lossy Channels Through Mabs
Authentication is one of the decisive subjects in protecting multicast in a situation attractive to malicious attacks. Multicast is a competent method to transport multimedia content from a sender to a group of recei...
The Need Of Financial Statement Analysis In A Firm/An Orgnization
Financial statement analysis play a dominate role in setting the frame watt of managerial decisions through analysis and interpretation of financial statement. This paper discusses about financial „ strength and we...
The Trust and Reputation Systems towards Data for Cloud and Wireless Sensor Networks Integrity
Cloud Computing has powerful data storage and data processing capabilities as well as Wireless sensor network has capability of gathering large amount of data. Presented on by including ordering data storage besides...