cloud aid public information with digital mark client revocation

S.P.Subha,Naveen raju

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:4         Issue:3         Year: 16 April,2015         Pages:397-402

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

The Storage and sharing of data in cloud can be easily modified by users.To overcome this data modification in cloud signature is provided to each individual who access the data in cloud. Once the data is modified by the user on a block, the user must ensure that the signature is provided on that specific block. When a user gets revoked from accessing the cloud the existing user of that cloud must re-sign the data signed by the revoked user. To re-sign the data the user must download the entire data and sign it. This difficulty is rectified with the a novel public auditing mechanism idea of proxy re-signatures. In addition to this, security of the data is also enhanced with the help of a public verifier who is always able to audit the integrity of shared data without retrieving the entire data from the cloud.

Kewords

Cloud,Data Storage,Internet

Reference

[1]. B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revoation in the Cloud,” in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912. [2]. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010. [3]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” in the Proceedings of ACM CCS 2007, 2007, pp. 598–610. [4]. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” in the Proceedings of ASIACRYPT 2008. Springer-Verlag,2008,pp. 90–107. [5]. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” in the Proceedings of ACM/IEEE IWQoS 2009, 2009, pp. 1–9. [6]. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,” in the Proceedings of ESORICS 2009. Springer-Verlag, 2009, pp. 355–370. [7]. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,