ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review on Identity-Based Proxy-Oriented Data Uploading and Inaccessible Data Integrity Inspection in Public Cloud

Journal: International Journal of Computer Techniques (Vol.4, No. 5)

Publication Date:

Authors : ;

Page : 6-9

Keywords : Cloud computing; Identity-based cryptography; Proxy public key cryptography; remote data integrity checking;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

More clients might want to store their information to PCS (public cloud servers) along with the rapid improvement of cloud computing. Cloud computing is changing into progressively popular. An outsized range of information square measure outsourced to the cloud by data homeowners actuated to access the large-scale computing resources and economic savings. The existing remote data possession checking (RDPC) protocols have been designed in the PKI (public key infrastructure) setting. The cloud server has to validate the users' certificates before storing the data uploaded by the users in order to prevent spam. When the client is controlled to admittance PCS, he determination representative its proxy to procedure his information and uploaded them in many files. On the additional pointer, inaccessible information examination is also an significant safety problematic in public cloud storage. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and security model. Cloud computing is the new range in wireless world. One of the major challenging issues is data integrity/security. For achieving the efficiency of cloud storage, the proposed system provides flexible data segmentation with additional authorization process among the three participating parties of client, server and a third-party auditor (TPA). We propose an identity based data storage scheme, it will resist the collusion attacks.

Last modified: 2018-05-18 21:31:43