Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications by using a shared pool of configurable computing resources by using data outsourcing users are relieved from the burden of data storage and maintenance. When users put their data (of large size) on the cloud, the data integrity protection is challenging. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of collusion resistant multi- proxy re-signatures, we allow the cloud to resign blocks on behalf of existing users during user revocation. Collusion-resistant proxy re-signature schemes generally have two levels of signatures. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously.

Keywords: Public Auditing, Third Party Auditing TPA, Shared Data, User Revocation, Proxy re-Signature

Edition: Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Share this Article

How to Cite this Article?

Ajmy Abbas, "Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151499, Volume 4 Issue 11, November 2015, 1499 - 1502

133 PDF Views | 80 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Public Auditing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2098 - 2102

Public Auditing System with Auto-Data Recovery System on Cloud Scheme

Dhane Sachin V., Joshi P.

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Similar Articles with Keyword 'Third Party Auditing TPA'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 757 - 760

A Review of Protect the Integrity of Outsourced Data Using Third Party Auditing for Secure Cloud Storage

Yogesh Shinde, Omprakash Tembhurne

Share this Article

Similar Articles with Keyword 'Shared Data'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1603 - 1607

Provisioning of Compression and Secure Management Services for Healthcare Data in Cloud Computing

Suhasini Kalki, Jayashree Agarkhed

Share this Article

Similar Articles with Keyword 'User Revocation'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1056 - 1059

Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud

Nikhitha K. Nair, Navin K. S.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1877 - 1881

Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption

Aakanksha Maliye, Sarita Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2627 - 2631

Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade, Fazeel Zama

Share this Article

Similar Articles with Keyword 'Proxy re-Signature'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 518 - 523

Efficient User Revocation in the Cloud

Supriya Gade, P. B. Kumbharkar

Share this Article
Top