Public Integrity Auditing with User Revocation in Cloud Data

  • Unique Paper ID: 143838
  • PageNo: 91-94
  • Abstract:
  • In up to date instances, some study believes the challenge of comfortable with efficient public data integrity auditing for unified dynamic data. On the other hand, these techniques are still no longer relaxed beside the collusion of cloud storage server as good as revoked group clients for the duration of person revocation in sensible cloud storage system. In this paper, we found out that the collusion attack within the exiting scheme. An effective public integrity auditing scheme with relaxed workforce user revocation based on vector commitment plus verifier-local revocation group signature. We designed a concrete scheme with a new constitution known as Decrypt key, which presents effectivity and reliability assurance for convergent key administration on mutually user along with cloud storage sides. The design is to use de-duplication to the convergent keys to affect secret sharing approaches.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{143838,
        author = {N.Venkatesh Naik and Heena Nousheen},
        title = {Public Integrity Auditing with User Revocation in Cloud Data},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {2},
        pages = {91-94},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=143838},
        abstract = {In up to date instances, some study believes the challenge of comfortable with efficient public data integrity auditing for unified dynamic data. On the other hand, these techniques are still no longer relaxed beside the collusion of cloud storage server as good as revoked group clients for the duration of person revocation in sensible cloud storage system. In this paper, we found out that the collusion attack within the exiting scheme. An effective public integrity auditing scheme with relaxed workforce user revocation based on vector commitment plus verifier-local revocation group signature. We designed a concrete scheme with a new constitution known as Decrypt key, which presents effectivity and reliability assurance for convergent key administration on mutually user along with cloud storage sides. The design is to use de-duplication to the convergent keys to affect secret sharing approaches.},
        keywords = {Key management, Insider attacks, Outsider attacks, Data confidentiality, Integrity Checking.},
        month = {},
        }

Cite This Article

Naik, N., & Nousheen, H. (). Public Integrity Auditing with User Revocation in Cloud Data. International Journal of Innovative Research in Technology (IJIRT), 3(2), 91–94.

Related Articles