Public Integrity Auditing with User Revocation in Cloud Data
Author(s):
N.Venkatesh Naik, Heena Nousheen
Keywords:
Key management, Insider attacks, Outsider attacks, Data confidentiality, Integrity Checking.
Abstract
In up to date instances, some study believes the challenge of comfortable with efficient public data integrity auditing for unified dynamic data. On the other hand, these techniques are still no longer relaxed beside the collusion of cloud storage server as good as revoked group clients for the duration of person revocation in sensible cloud storage system. In this paper, we found out that the collusion attack within the exiting scheme. An effective public integrity auditing scheme with relaxed workforce user revocation based on vector commitment plus verifier-local revocation group signature. We designed a concrete scheme with a new constitution known as Decrypt key, which presents effectivity and reliability assurance for convergent key administration on mutually user along with cloud storage sides. The design is to use de-duplication to the convergent keys to affect secret sharing approaches.
Article Details
Unique Paper ID: 143838

Publication Volume & Issue: Volume 3, Issue 2

Page(s): 91 - 94
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews