Privacy Preservation and traceability support using Public Auditing Mechanism
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
as future enhancement, we enhance the Oruta system in two interesting problems we will continue the study for our future work. One of them is traceability, which means the ability for the group manager (i.e., the original user) to reveal the identity of the signer based on verification metadata in some special situations.However, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information to identity the privacy to public verifiers. Since Oruta is based on the ring signatures, where the identity of the signer is unconditionally protected, the current design of ours does not support traceability. To the best of our knowledge, designing an efficient public auditing mechanism with the capabilities of preserving identity privacy and supporting traceability is still open. Another problem for our future work is how to prove data freshness (prove the cloud possesses the latest version of shared data) while still preserving identity privacy. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when auditing shared data integrity.
Authors and Affiliations
JayanthiAnusha| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, anusha.jayanthi24@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India
Premature Breast Cancer Mammographic Detection Using Image Segmentation Approaches
In the current era digital image processing occupies a dynamic role in every aspect of human survival. Image processing refers to progress digital images and mined attributes from images. In this paper we describe th...
Scalable Data Sharing In Cloud using Public Key Cryptosystem
Data sharing is an important functionality in cloud storage. We show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems that produce constant-s...
Self-assured Collective Data Transferring in Vehicular Ad Hoc Networks
Vehicular adhoc networks (VANETs) is the present innovation utilizing as a part of vehicles like cars and vans. Vehicles are considered as portable hubs in a MANET to make a versatile system likewise the most imperat...
To Achieve Perfect Resilience To Packet Loss In Lossy Channels Through Mabs
Authentication is one of the decisive subjects in protecting multicast in a situation attractive to malicious attacks. Multicast is a competent method to transport multimedia content from a sender to a group of recei...
Coefficient multipliers are the hindrances exhibit in programmable finite impulse response (FIR) advanced channels. As the channel coefficients change either powerfully or occasionally, the scan for basic sub articul...