integrity auditing for dynamic cloud using homomorphic encryption with group user revocation

Madhuri.P,

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:2         Year: 20 December,2016         Pages:1138-1145

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. Recently, some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. An efficient public integrity auditing with a secured group user revocation based on vector commitment and group user revocation. A distributed key generation algorithm is used to generate authenticated user passwords across multiple servers and eliminate single point failures. This scheme supports the public checking and efficient user revocation and also provides confidentiality, efficiency and traceability of secure group user revocation. A homomorphic encryption algorithm is also used for creating unique id for the users.

Kewords

data integrity, homomorphic encryption, vector commitment, integrity auditing

Reference

1. “Above the Clouds: A Berkeley View of Cloud Computing”,Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz,Andy Konwinski, Gunho Lee. 2. “Provable Data Possession at Untrusted Stores”, Giuseppe Ateniese, Randal Burns Reza Curtmola,Joseph Herring ,Lea Kissner ,Zachary Peterson ,Dawn Song. 3. ”PORs: Proofs of Retrievability for Large Files”,Ari Juels and Burton S. Kaliski Jr. 4.“Practical Dynamic Proofs of Retrievability”, Elaine Shi, Emil ,Stefanov. 5.“Dynamic Provable Data Possession”, C. Chris ErwayAlptekinKupc, Charalampos Papamanthou, Roberto Tamassia 6.“Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification”, Jiawei Yuan. 7.“Asymmetric Group Key Agreement”, Qianhong Wu1,2, Yi Mu3, Willy Susilo3, Bo Qin1,4 and Josep Domingo-Ferrer1 8.“Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou.