Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 379

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.9 / 10


     

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas


Abstract: With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications by using a shared pool of configurable computing resources by using data outsourcing users are relieved from the burden of data storage and maintenance. When users put their data (of large size) on the cloud, the data integrity protection is challenging. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of collusion resistant multi- proxy re-signatures, we allow the cloud to resign blocks on behalf of existing users during user revocation. Collusion-resistant proxy re-signature schemes generally have two levels of signatures. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously.


Keywords: Public Auditing, Third Party Auditing TPA, Shared Data, User Revocation, Proxy re-Signature


Edition: Volume 4 Issue 11, November 2015


Pages: 1499 - 1502



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Ajmy Abbas, "Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 1499-1502, https://www.ijsr.net/getabstract.php?paperid=NOV151499, DOI: https://www.doi.org/10.21275/NOV151499

Similar Articles

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1111 - 1114

Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Shilpa Singh, Padmavathi B.

Share this Article

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

Share this Article
Top