Author : B.Renugadevi 1
Date of Publication :22nd March 2018
Abstract: Today, distributed storage winds up noticeably one of the basic administrations, since clients can without much of a stretch change and offer information with others in cloud. Be that as it may, the honesty of shared cloud information is helpless to unavoidable equipment deficiencies, programming disappointments or human mistakes. To guarantee the trustworthiness of the mutual information, a few plans have been intended to permit open verifiers (i.e., Third Party Auditors) to productively review information trustworthiness without recovering the whole client information from cloud. But this may reveal data owners personal information to TPA. Here we are using homomorphic authenticable group signatures which is designed to protect privacy. Here, the auditors can verify the integrity of shared information on behalf of group users. The group users may include Group Managers and ordinary members. Any of the GMs can add new members or they can revoke members from the group. Transmission of data will be encrypted and even the data is stolen, the corresponding key cannot be restored. User revocation is done by the group manager using a publicly available revocation list. Once revoked, they cannot access any of the files. The main issue with the cloud is data integrity which can be resolved using MD5 algorithm. During the process of verification, the signature generated by the auditors and the one which is provided by the client are compared. If it does not match with each other, then it indicates that the data has been changed
Reference :
-
- D. Fernandes, L. Soares, J. Gomes, et al, “Security issues in cloud environments: a survey,” International Journal of Information Security.
- W. Hsien, C. Yang, and M. Hwang, “A survey of public auditing for secure data storage in cloud computing,” International Journal of Network Security, vol.18, no.1, pp. 133-142, 2016.
- J. Yu, K. Ren, C. Wang, et al, “Enabling Cloud Storage Auditing with Key-Exposure Resistance,” IEEE Transactions on Information Forensics and Security, vol.10, no.6, pp. 1167-1179, 2015.
- Q. Wang, C. Wang, K. Ren, et al, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
- S. Yu, “Big privacy: challenges and opportunities of privacy study in the age of big data,” IEEE Access, vol. 4, no. 6, pp. 2751-2763, 2016.
- C. Wang, Q. Wang, K. Ren, et al, “Privacypreserving public auditing for data storage security in cloud computing,” Proceedings of IEEEINFOCOM, pp. 1-9, 2010.
- B. Wang, B. Li, and H. Li, “Oruta: privacypreserving public auditing for shared data in the cloud,” IEEE Transactions on Cloud Computing, vol.2, no.1, pp.43-56, 2014.
- B. Wang, B. Li, and H. Li, “Knox: privacypreserving auditing for shared data with large groups in the cloud,” Applied Cryptography and Network Security. Springer Berlin Heidelberg, pp. 507-525, 2012.