Integrity Auditing with Homomorphic Encryption for Dynamic Cloud with Group user Revocation

نویسنده

  • Madhuri P
چکیده

With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. Recently, some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. An efficient public integrity auditing with a secured group user revocation based on vector commitment and group user revocation. A distributed key generation algorithm is used to generate authenticated userpasswords across multiple servers and eliminate single point failures. This scheme supports the public checking and efficient user revocation and also provides confidentiality, efficiency andtraceability of secure group user revocation. A homomorphic encryption algorithm is also used forcreating unique id for the users.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public Auditing for Regeneration Code Based Cloud Storage Using Homomorphic Encryption for User Privacy

To protect the outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Existing remote checking methods for regenerating-coded data only provide public auditing with the help of Third Party Auditor (TPA) and Proxy to manage and recover the data if lost, but there is a lack of use...

متن کامل

Secure Multi-Owner Data Sharing for Dynamic Groups using Proxy-Signature in the Cloud

Cloud computing offers an economical and efficient solution for sharing data among the cloud users with low support without the weight of neighborhood data storing and upkeep. In any case, the administration of the data and services may not be completely dependable on the cloud, as users no longer have physical possession of the outsourced personal data so data integrity protection turns into a...

متن کامل

Guest Editorial for Special Section on Advanced Techniques for Efficient and Reliable Cloud Storage

CLOUD computing has emerged as a disruptive technology andnew computing paradigm inwhich IT resources (hardware, software, applications, data storage, computing capacity, etc.) are provided as services over the Internet, through “everything-as-a-service”. It builds on the foundations of distributed computing, grid computing, virtualization, service orientation, etc. Cloud storage, which is one ...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Achieving Fine-grained Access Control and Integrity Auditing in Cloud Storage ⋆

Attributes based encryption (ABE) can achieve flexible and scalable access control and gurantee the confidentiality of the data stored in the cloud. However, important issues such as efficient user revocation and fine-grained access control are not straightforward, which constrain the adoption of ABE in cloud storage systems.Our proposed scheme realizes fine-grained read and write access contro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016