Shared Data Integrity Using Public Auditing Mechanism
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 6
Abstract
Cloud providers assure a safer and dependable environment to the users, the honesty of data in the cloud may still be cooperation, due to the survival of hardware/software failures and human errors. To make certain shared data honesty can be established publicly, users in the group require calculating signatures on all the blocks in shared data. Dissimilar blocks in shared data are usually signed by different users due to data changes do by different users. For security reasons, once a user is cancelled from the group, the blocks which were beforehand signed by this revoked user must be resigned by an existing user. The straightforward method which agrees to an existing user to download the parallel part of shared data and resigns it during user revocation, is inept due to the large size of shared data in the cloud. In this paper, we recommend a new public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By employing the plan of proxy re-signatures, we allow the cloud to re-sign blocks on behalf of existing users in user revocation, so that existing users do not need to download and re-sign blocks by themselves.
Authors and Affiliations
Supriya Menon| Associate Professor, 2Student, 3Associate Professor, HOD, Dept of CSE., Medha Institute of Science & Technology for Women, Saiprabhatnagar, Pedathanda, Khammam Rural, Khammam Dist, Telangana, India, Sameena Masrath| Dept of CSE., Medha Institute of Science & Technology for Women, Saiprabhatnagar, Pedathanda, Khammam Rural, Khammam Dist, Telangana, India, I. Narsimaha Rao| Dept of CSE., Medha Institute of Science & Technology for Women, Saiprabhatnagar, Pedathanda, Khammam Rural, Khammam Dist, Telangana, India
A high Step-up DC-DC Converter employs Cascading CockcroftWalton Voltage Multiplier by omitting Step-up Transformer
In my paper possess a high voltage gain and devoid of using Step up transformer through a high step-up DC-DC converter based on Cockcroft-Walton (CW) voltage multiplier. Here the input was in low to DC voltage is boo...
A Novel Approach for O (1) Parallel Sorting Algorithm
Sorting is an algorithm of the most relevant operations performed on computers. In particular, it is a crucial tool when it comes to processing huge volumes of data into the memory. There are different types of sortin...
Prevention of Sensitive Information by Enhancing Cloud Access Control
the scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication, and storage overheads are comparable to cen...
In created nations, utilizing high quality cement in structures today would bring about both specialized and practical preferred standpoint. In high quality solid, it is important to decrease the water/concrete propo...
Novel Visual Authentication Protocols to Defend Key Logging Issues
The best approach to accomplish secure correspondence is to have validation convention, which is a sort of cryptographic convention with the reason for confirming substances. The configuration of secure validation co...