Downloads: 146 | Views: 330 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017 | Popularity: 6.5 / 10
A Survey on Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Pallavi S. Kaulage, S. N. Kini
Abstract: More customers might want to store their information to PCS (open cloud servers) alongside the quick improvement of distributed computing. New security issues must be settled keeping in mind the end goal to help more customers process their information out in the open cloud. At the point when the customer is limited to get to PCS, he will designate its proxy to process his information and transfer them. Then again, remote information honesty checking is likewise an essential security issue out in the open distributed storage. It makes the customers check whether their outsourced information is kept in place without downloading the entire information. From the security issues, we propose a novel proxy arranged information transferring and remote information respectability checking model in personality based open key cryptography IDPUIC (personality based proxy situated information transferring and remote information respectability checking in broad daylight cloud). We give the formal definition, framework model and security display. At that point, a solid ID-PUIC convention is composed by utilizing the bilinear pairings. The proposed ID-PUIC convention is provably secure in view of the hardness of CDH (computational Diffie-Hellman) issue. Our ID-PUIC convention is likewise proficient and adaptable. In view of the unique customer's approval, the proposed ID-PUIC convention can understand private remote information respectability checking, designated remote information respectability checking and open remote information trustworthiness checking.
Keywords: proxy, cloud, identity, data, checking
Edition: Volume 6 Issue 1, January 2017
Pages: 1108 - 1112
DOI: https://www.doi.org/10.21275/ART20164284
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 724 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 704 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 691 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera