International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 268

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016 | Popularity: 6.2 / 10


     

Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation

Madhuri. P, Jayavarthini. C


Abstract: With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. Recently, some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. An efficient public integrity auditing with a secured group user revocation based on vector commitment and group user revocation. A distributed key generation algorithm is used to generate authenticated user passwords across multiple servers and eliminate single point failures. This scheme supports the public checking and efficient user revocation and also provides confidentiality, efficiency and traceability of secure group user revocation. A homomorphic encryption algorithm is also used for creating unique id for the users.


Keywords: data integrity, vector commitment, homomorphic encryption, integrity auditing


Edition: Volume 5 Issue 4, April 2016


Pages: 1093 - 1096


DOI: https://www.doi.org/10.21275/NOV162762



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Madhuri. P, Jayavarthini. C, "Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation", International Journal of Science and Research (IJSR), Volume 5 Issue 4, April 2016, pp. 1093-1096, https://www.ijsr.net/getabstract.php?paperid=NOV162762, DOI: https://www.doi.org/10.21275/NOV162762



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 1659 - 1668

Anomaly Detection: Enhancing Systems with Machine Learning

Yogananda Domlur Seetharama

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 1793 - 1802

Event - Driven Architecture: Building Responsive and Scalable Systems

Venkata Naga Sai Kiran Challa

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article
Top