Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data

Abstract

It is practiced for users to influence cloud storage services to contribute to data with others in a group as data sharing develop into a standard feature in most cloud storage offerings including Drop box, iCloud andGoogle Drive. The reliability of data in cloud storage though is matterto scepticism and scrutiny as data stored in the cloud can without problems be lost or corrupted due to the foreseeable hardware/ software failures and human errors. To formulate this substance even worse cloud service providers may be unenthusiastic to inform users about these data errors in order to retain the reputation of their services and shun losing profits. Consequently the veracity of cloud data should be confirmed before any data utilization such as search or computation over cloud data.

Authors and Affiliations

G. Mohan Phanindra Reddy| Student of Kakinada Institute of Engineering and Technology Sr.Asst Professor in the department of CSE, Kakinada Institute of Science technology, korangi, K. C. Pradeep| Student of Kakinada Institute of Engineering and Technology Sr.Asst Professor in the department of CSE, Kakinada Institute of Science technology, korangi

Keywords

Related Articles

Peripatetic Shared TV Using Cloud

While demands on video traffic over Portable networks have been souring, the wireless link capacity cannot keep up with the traffic demand. The gap between the traffic demand and the link capacity, along with time-va...

GSM Technology: Architecture, Security and Future Challenges

GSM means Global System for mobile communication. GSM is generally utilized mobile correspondence framework on the planet. GSM framework was produced as an advanced framework utilizing time division multiple access (...

Reversable Afore Encoding For Revocable Data Spanking In Encoded Images

In this spell image encoding is precise mounting work it is rapidly available through the Netting. Companies devour the ability to commune with a worldwide spectators through the World Wide netting. The extraction is...

Analysis Of Seven Level Asymmetric Cascaded H-Bridge Inverter

The cascaded multilevel inverter (CMLI) has gained much attention in recent years due to its advantages in high voltage and high power with low harmonics applications. A standard cascaded multilevel inverter requires...

An Additive Order and Privacy Preserving Function Family (AOPPF)

The abundant advantages of cloud computing, for protection concerns, people and venture clients are reluctant to outsource their susceptible data, including E- mail, individual health records and government private d...

Download PDF file
  • EP ID EP16771
  • DOI -
  • Views 290
  • Downloads 8

How To Cite

G. Mohan Phanindra Reddy, K. C. Pradeep (2016). Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data. International Journal of Science Engineering and Advance Technology, 4(8), 366-369. https://europub.co.uk/articles/-A-16771