Secured Public Integrity Auditing with Key-ExposureResistance and Shared Dynamic Cloud

Conference: Third International Conference on Current Trends in Engineering Science and Technology
Author(s): Basavaraj Neelagund Year: 2017
Grenze ID: 02.ICCTEST.2017.1.18 Page: 108-112

Abstract

Cloud storage auditing is one of the important services to verify the integrity of the data present in public cloud. Modern auditing protocols are all based on the conjecture that the client’s secret key for auditing is absolutely secure. This benefit in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully honourable, it raises security concerns on how to realize data deduplication in cloud while achieving integrity auditing. To provide an efficient public integrity auditing scheme for data on public cloud. We design a concrete scheme based on scheme definition. Our scheme supports the public checking and efficient user revocation and also some polite properties, such as assertively, effectiveness, countability and traceability of secure group user revocation. Finally, the security and experimental analysis shows that, compared with its relevant schemes our scheme is also secure and efficient.

<< BACK

ICCTEST - 2017