Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data

Abstract

It is practiced for users to influence cloud storage services to contribute to data with others in a group as data sharing develop into a standard feature in most cloud storage offerings including Drop box, iCloud andGoogle Drive. The reliability of data in cloud storage though is matterto scepticism and scrutiny as data stored in the cloud can without problems be lost or corrupted due to the foreseeable hardware/ software failures and human errors. To formulate this substance even worse cloud service providers may be unenthusiastic to inform users about these data errors in order to retain the reputation of their services and shun losing profits. Consequently the veracity of cloud data should be confirmed before any data utilization such as search or computation over cloud data.

Authors and Affiliations

G. Mohan Phanindra Reddy| Student of Kakinada Institute of Engineering and Technology Sr.Asst Professor in the department of CSE, Kakinada Institute of Science technology, korangi, K. C. Pradeep| Student of Kakinada Institute of Engineering and Technology Sr.Asst Professor in the department of CSE, Kakinada Institute of Science technology, korangi

Keywords

Related Articles

To Provide A Classification Mechanism To Avoid Useless Data From Osn Walls

It recommends an automated system called Filtered Wall able to filter unwanted messages from OSN user walls to involuntarily allocate with each short text message a set of categories based on its content. In OSNs ther...

An Advanced Control Strategy For Solar PV And Battery Storage Integration System Using A Three Level NPC Inverter

In this venture, another design of a three-level impartial point-braced (NPC) inverter that can incorporate sunlight based photovoltaic (PV) with battery stockpiling in a lattice associated framework is proposed. The...

We depict our CDA report era and coordination Open API benefit in light of distributed computing, through which doctor's facilities are empowered to helpfully create CDA records without purchasing exclusive programmi...

Sensor networks are utilized as a part of various application spaces, for example, digital physical framework frameworks, natural checking, control lattices, and so on. Information are created at an extensive number...

Carp A Novel Approach To Address The Well-Known Image Hotspot Problem In Popular Graphical Password Systems

In a novel safety pre-historic based on hard AI problems, that is, a new relations of graphical password systems put together Captcha knowledge, which we call CaRP (Captcha as gRaphical Passwords). CaRP is click-base...

Download PDF file
  • EP ID EP16771
  • DOI -
  • Views 305
  • Downloads 8

How To Cite

G. Mohan Phanindra Reddy, K. C. Pradeep (2016). Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data. International Journal of Science Engineering and Advance Technology, 4(8), 366-369. https://europub.co.uk/articles/-A-16771