Shared Data Integrity Using Public Auditing Mechanism

Abstract

Cloud providers assure a safer and dependable environment to the users, the honesty of data in the cloud may still be cooperation, due to the survival of hardware/software failures and human errors. To make certain shared data honesty can be established publicly, users in the group require calculating signatures on all the blocks in shared data. Dissimilar blocks in shared data are usually signed by different users due to data changes do by different users. For security reasons, once a user is cancelled from the group, the blocks which were beforehand signed by this revoked user must be resigned by an existing user. The straightforward method which agrees to an existing user to download the parallel part of shared data and resigns it during user revocation, is inept due to the large size of shared data in the cloud. In this paper, we recommend a new public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By employing the plan of proxy re-signatures, we allow the cloud to re-sign blocks on behalf of existing users in user revocation, so that existing users do not need to download and re-sign blocks by themselves.

Authors and Affiliations

Supriya Menon| Associate Professor, 2Student, 3Associate Professor, HOD, Dept of CSE., Medha Institute of Science & Technology for Women, Saiprabhatnagar, Pedathanda, Khammam Rural, Khammam Dist, Telangana, India, Sameena Masrath| Dept of CSE., Medha Institute of Science & Technology for Women, Saiprabhatnagar, Pedathanda, Khammam Rural, Khammam Dist, Telangana, India, I. Narsimaha Rao| Dept of CSE., Medha Institute of Science & Technology for Women, Saiprabhatnagar, Pedathanda, Khammam Rural, Khammam Dist, Telangana, India

Keywords

Related Articles

Active Cloud Valuing for Revenue Expansion

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Sharing data in a multiowner manner while preserving data and identity...

A Graph theory algorithmic approach to data clustering and its Application

Clustering is the unproven classification of data items, into groups known as clusters. The clustering problem has been discussed in many area of research in many disciplines; this reflects its huge usefulness in the...

Automatic Measuring And Recompense System For Monitoring Health Management Process For Automobiles

In this projected project work, numerous physical systems detector readings will be measured and by standardization different system performs will be foreseeable. The project uses to ARM core with a will bus communic...

Reduced On_Chip Codeword Generation For Cross Talk Effect In Data Transmission Bus

Today we are having tremendous growth on cross technologies but these technology is limited on interconnected networks. We are having delay for these networks our major goal is prune delay this type of networks but i...

Detection of Behavioral Malware in Delay Tolerant Networks

Disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of m...

Download PDF file
  • EP ID EP16501
  • DOI -
  • Views 353
  • Downloads 11

How To Cite

Supriya Menon, Sameena Masrath, I. Narsimaha Rao (2015). Shared Data Integrity Using Public Auditing Mechanism. International Journal of Science Engineering and Advance Technology, 3(6), 198-201. https://europub.co.uk/articles/-A-16501