Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data
Abstract
It is practiced for users to influence cloud storage services to contribute to data with others in a group as data sharing develop into a standard feature in most cloud storage offerings including Drop box, iCloud andGoogle Drive. The reliability of data in cloud storage though is matterto scepticism and scrutiny as data stored in the cloud can without problems be lost or corrupted due to the foreseeable hardware/ software failures and human errors. To formulate this substance even worse cloud service providers may be unenthusiastic to inform users about these data errors in order to retain the reputation of their services and shun losing profits. Consequently the veracity of cloud data should be confirmed before any data utilization such as search or computation over cloud data.
References
B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,†Proc. IEEE Fifth Int’l Conf. Cloud Computing, pp. 295-302, 2012.
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,†Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,†IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protection for the Masses,†Computer, vol. 45, no. 1, pp. 39-45, 2012.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,†Proc. IEEE INFOCOM, pp. 525-533, 2010.
B. Wang, M. Li, S.S. Chow, and H. Li, “Computing Encrypted Cloud Data Efficiently under Multiple Keys,†Proc. IEEE Conf. Comm. and Network Security (CNS ’13), pp. 90-99, 2013.
R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,†Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
The MD5 Message-Digest Algorithm (RFC1321). https://tools.ietf.org/html/rfc1321, 2014.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,†Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-610, 2007.
H. Shacham and B. Waters, “Compact Proofs of Retrievability,†Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90- 107, 2008.
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,†Proc. 16th ACM Conf. Computer and Comm. Security (CCS’09), pp. 213-222, 2009.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,†Proc. 14th European Conf. Research in Computer Security
(ESORICS’09), pp. 355-370, 2009.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,†Proc. 17th Int’l Workshop Quality of Service (IWQoS’09), pp. 1-9, 2009.
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote Data Checking for Network Coding-Based Distributed Storage Systems,†Proc. ACM Workshop Cloud Computing Security Workshop
(CCSW’10), pp. 31-42, 2010.
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S Yau, “Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds,†Proc. ACM Symp. Applied Computing (SAC’11), pp. 1550-1557, 2011.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â