Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:4 Issue:3 Year: 16 April,2015 Pages:397-402
The Storage and sharing of data in cloud can be easily modified by users.To overcome this data modification in cloud signature is provided to each individual who access the data in cloud. Once the data is modified by the user on a block, the user must ensure that the signature is provided on that specific block. When a user gets revoked from accessing the cloud the existing user of that cloud must re-sign the data signed by the revoked user. To re-sign the data the user must download the entire data and sign it. This difficulty is rectified with the a novel public auditing mechanism idea of proxy re-signatures. In addition to this, security of the data is also enhanced with the help of a public verifier who is always able to audit the integrity of shared data without retrieving the entire data from the cloud.
Cloud,Data Storage,Internet
[1]. B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revoation in the Cloud,” in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912. [2]. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010. [3]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” in the Proceedings of ACM CCS 2007, 2007, pp. 598–610. [4]. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” in the Proceedings of ASIACRYPT 2008. Springer-Verlag,2008,pp. 90–107. [5]. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” in the Proceedings of ACM/IEEE IWQoS 2009, 2009, pp. 1–9. [6]. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,” in the Proceedings of ESORICS 2009. Springer-Verlag, 2009, pp. 355–370. [7]. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,