International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

With distributed services strategy, it is commonplace for data to be not only stored in the server, but also shared across multiple users. However, public auditing for such shared data while preserving identity privacy remains to be an open challenge. In this paper, propose a privacy-preserved auditing on shared data stored in the distributed storage. In particular, exploit cryptographic signatures to compute the verification information needed to audit the integrity of shared data. With this mechanism, the identity of the signer in shared data is kept private from a third party auditor (TPA), who is still able to publicly verify the integrity of shared data. Experimental results can demonstrate the effectiveness and efficiency of the proposed mechanism when auditing shared data.

Keywords: Public auditing, Shared data, Privacy-preserving, Distributed system, Trusted TPA, Data anonymization

Edition: Volume 4 Issue 9, September 2015

Pages: 2058 - 2061


How to Cite this Article?

Anes P. A., Neethu Francis, "Privacy Preserved Public Auditing for Distributed Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158555, Volume 4 Issue 9, September 2015, 2058 - 2061

33 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Public auditing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1681 - 1685

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Pranita Bakka, Dr. Jayashree Agarkhed

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2098 - 2102

Public Auditing System with Auto-Data Recovery System on Cloud Scheme

Dhane Sachin V., Joshi P.

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2750 - 2752

Secrecy Preserving Public Ascertaining for Cloud Storage Using Digital Signature

Rekha A, Padmashree G

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this article



Similar Articles with Keyword 'Shared data'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1074 - 1077

A Secure and Efficient Way of Accessing Encrypted Cloud Databases Using Adaptive Encryption Scheme

Seethal K S, Siddana Gowda

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2750 - 2752

Secrecy Preserving Public Ascertaining for Cloud Storage Using Digital Signature

Rekha A, Padmashree G

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this article



Similar Articles with Keyword 'Privacy-preserving'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1880 - 1884

A Dynamic Secure Group Sharing in Cloud Computing

Shobha D. Patil, Dr. Sulochana B. Sonkamble

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this article



Similar Articles with Keyword 'Distributed system'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 774 - 777

MapReduce: Architecture and Internals

V. Sajwan, V. Yadav

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1459 - 1461

Using Peer to Peer Approach of Distributed Systems to Design a Chat Room Application

Kennevor D.G. Kharsyntiew

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1124 - 1127

A Multiple QOS Constraints Based Trustworthy Resource Sharing In Cloud Computing Using Fuzzy Neural Network Harmony Platform

Gils P Jose, D Satish Kumar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2701 - 2704

Review on Self Organized Trust Model for Distributed Systems

Suyog Ashokrao Nagare

Share this article



Similar Articles with Keyword 'Data anonymization'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 971 - 973

Efficient Approach for Anonymizing Tree Structured Dataset using Improved Greedy Search Algorithm

Ruchira Warekar, Savitri Patil

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this article
Top