Data stored in the
cloud is a storage shared by multiple users. Regrettably, Error caused by human
in data security and in software makes the security of data in the cloud to be
a question for the end users. However, the integrity of the data for public
disclosure is already shared with the method of the audit identify the privacy
of data from the auditors must be disclosed. In this article we propose a
policy to maintain and support the data in cloud using the privacy policy in a
public. In this proposed system we use a ring scheme to derive the data shared
with the help of metadata which is an authentication signature for maintaining
accuracy od data. With our system, for execution and verifying the integrity of
the shared data by ruining the signer's identity in private and checking for
the execution of multiple tasks simultaneously. In the audit experiment which
results in the integrity and demonstrate the effectiveness and efficiency of
our system.
Country : India
1 Prasanthi Gundabattini
Associate Professor, Department of Computer Science and Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India
B. Wang, B. Li, and H. Li, “Oruta:
Privacy- Preserving PublicAuditing for Shared Data in the Cloud,” Proc. IEEE
Fifth Int’l Conf.Cloud Computing, pp. 295-302, 2012.
M. Armbrust, A. Fox, R. Griffith,
A.D. Joseph, R.H. Katz, A.Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I.
Stoica, andM. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4,
pp. 50-58, Apr. 2010.
K. Ren, C. Wang, and Q. Wang,
“Security Challenges for the PublicCloud,” IEEE Internet Computing, vol. 16,
no. 1, pp. 69-73, 2012.
D. Song, E. Shi, I. Fischer, and U.
Shankar, “Cloud Data Protectionfor the Masses,”Computer, vol. 45, no. 1, pp.
39-45, 2012.
Wang, Q. Wang, K. Ren, and W. Lou,
“Privacy- PreservingPublic Auditing for Data Storage Security in Cloud
Computing,”Proc. IEEE INFOCOM, pp. 525- 533, 2010.
B. Wang, M. Li, S.S. Chow, and H. Li,
“Computing EncryptedCloud Data Efficiently under Multiple Keys,” Proc. IEEE
Conf.Comm. and Network Security (CNS ’13), pp. 90-99, 2013.
R. Rivest, A. Shamir, and L. Adleman,
“A Method or ObtainingDigital Signatures and Public Key Cryptosystems,” Comm.
ACM, vol. 21, no. 2, pp. 120-126, 1978.
The MD5 Message-Digest Algorithm
(RFC1321). https://tools.ietf.org/html/rfc1321, 2014.
G. Ateniese, R. Burns, R. Curtmola,
J. Herring, L. Kissner,Z. Peterson, and D. Song, “Provable Data Possession
atUntrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS
’07), pp. 598-610, 2007.
H. Shacham and B. Waters, “Compact
Proofs of Retrievability,”Proc. 14th Int’l Conf. Theory and Application of
Cryptology and InformationSecurity: Advances in Cryptology (ASIACRYPT ’08), pp.
90- 107, 2008.