Maintaining Integrity for Shared Data In Cloud With Ring Signatures
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 7
Abstract
The wild success of cloud data services bring the cloud commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information—identity privacy—to public verifiers. In this paper, we propose a novel privacypreserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when auditing shared data integrity.
Authors and Affiliations
N. Nagamani| M.Tech (CSE), Nimra Women’s College Of Engineering, A.P., India, Dr. Syed Sadat Ali| Associate Professor, Dept. of Computer Science & Engineering, Nimra College of Engineering and Technology(NCET), A.P., India
Implementation of Area Efficient and High Bit Rate Serial-Serial Multiplier With On-the-Fly Accumulation by Asynchronous Counters
Traditional Serial-Serial multiplier addresses the high data sampling rate. It is effectively considered as the entire partial product matrix with n data sampling cycle for n×n multiplication function instead of 2n...
Configuration as well as Performance of an On-Chip IncarnationArrangement for Multiprocessor System-On-Chip
The novel on-chip coordinate in silicon indicated course of action to fortify ensured development change in multiprocessor SOC applications. A pipelined circuit-exchanging Employed in the proposed structure with FIFO...
Key logging Prevention by QR code with Visual Authentication
Key logging is an activity of capturing users’ keyboard the activity key logger hardware and software. The key loggers secretly monitor and log all keystrokes. Malicious programs, key loggers do not cause any threat...
Eco-Physiological Studies On Fox Sagar Lake With Reference To Water Quality
The present paper deals with the ecological studies on Fox Sagar lake with reference to pollution. For this purpose both physicochemical and biological parameters were analysed. Fox Sagar lake is famous for its natura...
Analysis of Hyoid Structured And Perforated Pinfin Heat Sink In Inline And Staggered Flow
The usage of the electronic goods has been increased tremendously; hence it is the challenging task to improve the cooling for such devices. The heat dissipation rate should be maximized in the electronic devices lik...