Shared Data Integrity Using Public Auditing Mechanism
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 6
Abstract
Cloud providers assure a safer and dependable environment to the users, the honesty of data in the cloud may still be cooperation, due to the survival of hardware/software failures and human errors. To make certain shared data honesty can be established publicly, users in the group require calculating signatures on all the blocks in shared data. Dissimilar blocks in shared data are usually signed by different users due to data changes do by different users. For security reasons, once a user is cancelled from the group, the blocks which were beforehand signed by this revoked user must be resigned by an existing user. The straightforward method which agrees to an existing user to download the parallel part of shared data and resigns it during user revocation, is inept due to the large size of shared data in the cloud. In this paper, we recommend a new public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By employing the plan of proxy re-signatures, we allow the cloud to re-sign blocks on behalf of existing users in user revocation, so that existing users do not need to download and re-sign blocks by themselves.
Authors and Affiliations
Supriya Menon| Associate Professor, 2Student, 3Associate Professor, HOD, Dept of CSE., Medha Institute of Science & Technology for Women, Saiprabhatnagar, Pedathanda, Khammam Rural, Khammam Dist, Telangana, India, Sameena Masrath| Dept of CSE., Medha Institute of Science & Technology for Women, Saiprabhatnagar, Pedathanda, Khammam Rural, Khammam Dist, Telangana, India, I. Narsimaha Rao| Dept of CSE., Medha Institute of Science & Technology for Women, Saiprabhatnagar, Pedathanda, Khammam Rural, Khammam Dist, Telangana, India
Improvement of Grid Current Compensator in Distributed Generation System
This paper Proposed a new current control topology for grid-connected based distributed generation (DG), which helps the DG to exchange a sinusoidal current into the utility grid despite the distorted grid voltage an...
A Novel Attack Methods For Inferring On Certain Url’s On Twitter
Twitter is a well-known online informal organization benefit for sharing short messages (tweets) among friends. Its clients regularly utilize URL shortening administrations that give (i) a short false name of a long...
Under water Image preprocessing by Average filter and a comparison study
Underwater image pre-processing is extremely essential because, under water images suffer from quality degradation due to low transmission of light. When an underwater image is captured, pre-processing is necessary t...
Study on Remote File Attacking – Inclusion & Detection
Presently applications of web are increasing exponentially. We are almost totally dependent on Internet and associated technologies. Huge applications in all walk of lives are inviting attacks on them. Their usage are...
Finest Informant Filtering of Malicious Traffic in Intrusion Detection System
Traffic volume and diversity will have a major impact on the power of network intrusion detection systems (NIDS) to report malicious activity accurately. Supported the observation that a good deal of traffic is, in f...