Secure Cloud Storage Privacy-Preserving In Public Auditing
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2023, Vol 11, Issue 3
Abstract
Cloud computing is a technology that is both efficient and cost-effective, thanks to its low maintenance requirements. This paper implemented a approach is used to share group resources across cloud users. Regrettably, as a result of the frequent differences in participation, the issue of sharing information in a multi-owner manner while also preserving privacy and information from a trusted cloud continues to be a challenging one. During the course we put into place a safe method of data sharing among multiple owners using the Diffe- Hellman algorithm that are cloud-based and applicable to rotating groups. By leveraging techniques like as group signature and dynamic broadcast encryption, any user of the cloud has the ability to anonymously share data with other users. In the meanwhile, the number of users whose access has been revoked does not have any impact on the storage overhead or encryption computation costs associated with our system. In addition, employ rigorous proofs to investigate the scheme's level of safety, and conduct tests to verify the scheme's usefulness.
Authors and Affiliations
Suresh Dara, K. Pujitha, I. Santhi, and V. Saikavya
Optimized LMS: A Solution to Online Learning in Covid-19
Over the world, school and universities have been closed for a considerable length of time. Instruction has ended up being principle worry in the midst of coronavirus emergency in the nation. At some point in the second...
A Review of the Android Operating System's Evolution
Traditionally, telephones were only used for making telephone conversations; however, with the introduction of the artificial intelligence gadget, the savvy handset has evolved into a minimal hand-held computer device. T...
The Electricity Creation by the Means of Hydro Power Plant
Energy can be produced in a variety of ways, and electricity is one of them. Hydropower plants produce electricity from water, thermal power plants produce electricity from heat, wind energy power plants produce electric...
Exploring The World Of Collaborative Sharing Over The Internet Through The Use Of A PeerTo-Peer Network Protocol
Abstract-P2P downloads represent a large portion of today’s Internet traffic. Millions of users operate BitTorrent and generate more than 30% of the total Internet traffic. This paper mainly examines the working of the B...
VANET-OLSR Cooperative Cross-Layer Detection for Black hole Attacks
In this study, we address the issue of detecting hot spot problem targeting Multi Point Relays (MPRs) using Vehicular Ad hoc channels Reactive Routing protocol (VANET-OLSR). To identify network-related threats, a watchdo...