Efficient User Revocation in Dynamic Cloud Using Proxy Server.
Main Article Content
Abstract
Cloud provides services like data storage and data sharing in a group. Users can remotely store their data on cloud and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. But the management of the data and services may not be fully trustworthy on cloud, as users no longer have physical possession of the outsourced personal data so data integrity protection becomes a difficult task. Maintaining the integrity of shared data services where data is shared among number of cloud user, is also a challenging task. This paper gives Efficient User Revocation in Dynamic Cloud Using Proxy Server and for that it uses Homomorphic linear authenticator with random masking technique. Homomorphic authenticable proxy resignature scheme with Panda public auditing mechanism checks shared data integrity along with efficient user revocation. Furthermore, these mechanisms are able to support batch auditing by verifying multiple auditing tasks simultaneously.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Boyang Wang, Baochun Li and Hui Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud”, IEEE Transactions on services computing, vol. 8, no. 1, January/February 2015.
B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, Proc. IEEE CLOUD, pp. 295-302, 2014.
H. Wang, “Proxy Provable Data Possession in Public Clouds”, IEEE Trans. Services Computing, vol. 6, no. 4, pp. 551-559, Oct.-Dec. 2013.
C. Wang, Q. Wang, K. Ren ,“Privacy-Preserving Public Auditing for Secure Cloud Storage Auditing”, IEEE transaction on computer, 2013.
C. Wang, Q. Wang, K. Ren, and W. Lou, “PrivacyPreserving Public Auditing for Data Storage Security in Cloud Computing”, Proc. IEEE INFOCOM, pp. 525-533, 2010.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing”,Proc. 14th European Conf. Research in Computer Security (ESORICS09), pp. 355- 370, 2009.
H. Shacham and B. Waters, “Compact Proofs of Retrievability”, Proc. 14th Intl Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT08), pp. 90-107, 2008.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, LKissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores”, Proc. 14th ACM Conf. Computer and Comm. Security (CCS07), pp. 598-610, 2007.
Shamir, “How to Share a Secret”, Comm. ACM, vol. 22, no. 11,pp. 612-613, Nov. 1979.