A Survey paper on Public Integrity Auditing for Shared Dynamic Cloud Data Using HMAC Algorithm

نویسندگان
چکیده

منابع مشابه

Dynamic Data Integrity and Checkpoint Recovery Using Public Auditing in Cloud Storage

Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing d...

متن کامل

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

Cloud Computing is a class of network based computing over Internet. Cloud data services not only stores data in the cloud but also shares across multiple users. The integrity of cloud data is subjected to reluctance due to failure of either hardware or even software and also human errors as well. Several mechanisms have been designed in order to allow both the data owners as well as the public...

متن کامل

A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing

Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage services bring a lot of convenience, many enterprises and users store the data to the cloud storage. However, the user will outsource data to the cloud storag...

متن کامل

Auditing for shared Data in the Cloud using Group Dynamics

We propose a privacy preserving mechanism in which the identity of the user on each shared block is protected from public verifiers, who are responsible to efficiently verify shared data integrity instead of retrieving the entire file. Ring signature is being exploited to audit the correctness of shared data by verifying the metadata available to the auditor. To improve the efficiency of verify...

متن کامل

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

In this project the utilization and combining of public key based homomorphic authenticator with random masking to achieve the preservation of privacy to the public cloud data auditing system which meets all the above requirements. If there is a situation for multi auditing tasks then we further extend the technique of bilinear aggregate signature to extend the main result to multi user setting...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2017

ISSN: 2278-1021

DOI: 10.17148/ijarcce.2017.63121