A Survey paper on Public Integrity Auditing for Shared Dynamic Cloud Data Using HMAC Algorithm
نویسندگان
چکیده
منابع مشابه
Dynamic Data Integrity and Checkpoint Recovery Using Public Auditing in Cloud Storage
Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing d...
متن کاملPrivacy-Preservation and Public Auditing for Cloud Data - A Survey
Cloud Computing is a class of network based computing over Internet. Cloud data services not only stores data in the cloud but also shares across multiple users. The integrity of cloud data is subjected to reluctance due to failure of either hardware or even software and also human errors as well. Several mechanisms have been designed in order to allow both the data owners as well as the public...
متن کاملA Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing
Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage services bring a lot of convenience, many enterprises and users store the data to the cloud storage. However, the user will outsource data to the cloud storag...
متن کاملAuditing for shared Data in the Cloud using Group Dynamics
We propose a privacy preserving mechanism in which the identity of the user on each shared block is protected from public verifiers, who are responsible to efficiently verify shared data integrity instead of retrieving the entire file. Ring signature is being exploited to audit the correctness of shared data by verifying the metadata available to the auditor. To improve the efficiency of verify...
متن کاملPreserving Data Integrity and Public Auditing for Data Storage in Cloud Computing
In this project the utilization and combining of public key based homomorphic authenticator with random masking to achieve the preservation of privacy to the public cloud data auditing system which meets all the above requirements. If there is a situation for multi auditing tasks then we further extend the technique of bilinear aggregate signature to extend the main result to multi user setting...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2017
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2017.63121