Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data

Abstract

It is practiced for users to influence cloud storage services to contribute to data with others in a group as data sharing develop into a standard feature in most cloud storage offerings including Drop box, iCloud andGoogle Drive. The reliability of data in cloud storage though is matterto scepticism and scrutiny as data stored in the cloud can without problems be lost or corrupted due to the foreseeable hardware/ software failures and human errors. To formulate this substance even worse cloud service providers may be unenthusiastic to inform users about these data errors in order to retain the reputation of their services and shun losing profits. Consequently the veracity of cloud data should be confirmed before any data utilization such as search or computation over cloud data.

Authors and Affiliations

G. Mohan Phanindra Reddy| Student of Kakinada Institute of Engineering and Technology Sr.Asst Professor in the department of CSE, Kakinada Institute of Science technology, korangi, K. C. Pradeep| Student of Kakinada Institute of Engineering and Technology Sr.Asst Professor in the department of CSE, Kakinada Institute of Science technology, korangi

Keywords

Related Articles

Modeling And Simulation Of Grid Connected Inverter For Power Quality Enhancement By Using Cascaded CurrentVoltage Control Strategy

This paper is presenting, a cascaded current– voltage control strategy which is proposed for inverters to concurrently get better the power quality of the inverter local load voltage and the current exchanged with...

Forecast-Founded Haze Bandwidth and Cost Decrease Scheme

In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) Scheme, designed for Haze computing customers. Haze-Founded TRE needs to apply a judicious use of Haze resourc...

Increase of Charge-Coupled Device Resolution limits using Spatial Light Modulator

Resolution of the imaging devices is mainly restricted by the pixels pitch, the pixels size and shape. We show a methodology where a Liquid Crystal on Silicon presentation is utilized to produce diverse direct stages...

An Enhanced Efficient User Revocation Mechanism on Top of Anonymous ABE

Now days there are a number of applications which uses the cloud storage service for storing and accessing information. In such conditions the data owner management and privacy preservation cryptographic techniques a...

An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing

Software as a Service (SaaS) is an important flavor of cloud computing to provide comprehensive Business emulsion. modernization in cloud computing are foremost to a promising future for cloud association, where wide...

Download PDF file
  • EP ID EP16771
  • DOI -
  • Views 273
  • Downloads 8

How To Cite

G. Mohan Phanindra Reddy, K. C. Pradeep (2016). Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data. International Journal of Science Engineering and Advance Technology, 4(8), 366-369. https://europub.co.uk/articles/-A-16771