Privacy Preserving Public Aditing of Shared Data
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 4, Issue 3
Abstract
In this paper, we propose a novel privacy preserving mechanism that supports public auditing on shared data stored in the cloud 2 . Particularly, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. Using our idea , of the signer on each block in shared data is kept private from all public verifiers, who are able to easily verify shared data integrity without getting the entire file. In addition, our mechanism is able to perform various auditing tasks at same time instead of verifying them one by one. The propose system, a privacy preserving public auditing mechanism for shared data in any source particularly cloud. We can use ring signatures to build homomorphism authenticators, so that a public verifier is able to perform auditing task shared data integrity without retrieving the entire data to improve efficiency further extend our mechanism to support batch auditing. There are two problems we will continue to study for our future work. One of them is traceability of data , which means the group manager can able to reveal the identity of the signer based on verification metadata in some special situations. Dr. H. Azath | Mohankmar M | Kishore Prasad M | Nagulraj A "Privacy Preserving Public Aditing of Shared Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30680.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30680/privacy-preserving-public-aditing-of-shared-data/dr-h-azath
Authors and Affiliations
Dr. H. Azath | Mohankmar M | Kishore Prasad M | Nagulraj A
Implementation of Supply Chain Management and its Effectiveness on Marketing of Business Organisations
Supply chain control has assumed a good sized role in firms performance and has attracted serious research interest over the last few years. A literature reviewreveals a massive spurt in studies in principle and exercise...
This study is to analyze the risk that is involved in using ETFs for long term wealth generation
Exchange Traded Funds (ETFs) may be lauded as a cheap and simple alternative to opaque actively managed funds. ETF as an investment vehicle is “aleast on the surface is rather simple. It allows individual investors who m...
Teenagers Use of Hard Drugs and Mental Health Problems in Bayelsa State, a Case Study of Okaka Correctional Service Centre
This study examined the use of hard drugs and mental problems among teenagers in Yenagoa, Bayelsa state A survey of the Nigerian Correctional Service, Okaka. The study was guided by four objectives and four corresponding...
Modeling and Characterization of Metal Matrix Composite Aluminum Graphite Composite
The emergence of metal matrix composites is partly a consequence of an improved understanding of their potentials and limitations based on their science of process, principles of physical metallurgy and interfacial chemi...
An AI Based ATM Intelligent Security System
Nowadays most of the surveillance cameras in ATM doesn’t record with detail for analysis of incidents. Due to this most of the ATM cases gets unsolved. In this paper a system to improve ATM security is proposed. The prop...