ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Enabling Public Verifiability for Storage Security in Cloud Computing

Journal: International Journal of Advances in Computer Science and Technology (IJACST) (Vol.5, No. 9)

Publication Date:

Authors : ; ;

Page : 126-132

Keywords : auditing; privacy; shared information;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this paper, we have a tendency to propose a completely unique privacy-preserving mechanism that supports public auditing on shared knowledge hold on within the cloud. Especially, we have a tendency to exploit ring signatures to reason verification information required to audit the correctness of shared knowledge. With our mechanism, the identity of the signer on each block in shared data is unbroken private from public verifiers, World Health Organization area unit ready to efficiently verify shared knowledge integrity while not retrieving the whole file. Additionally, our mechanism is in a very position to perform multiple auditing tasks at a similar time instead of confirmatory them one by one. The propose system, we've a bent to utilize ring signatures to construct similarity authenticators, therefore a public supporter is in a very position to audit shared data integrity while not retrieving the whole knowledge, nevertheless it cannot distinguish who is that the signer on every block. To boost the potency of confirmative multiple auditing tasks, we have a tendency to more extend our mechanism to support batch auditing. There square measure 2 attention-grabbing issues we are going to still study for our future work. One in every of them is traceability, which implies the flexibility for the cluster manager to reveal the identity of the signer supported verification information in some special things

Last modified: 2016-10-23 15:53:30