Efficient User Revocation in Dynamic Cloud Using Proxy Server.
Pocha Nageswara Reddy, D.Jayanarayana Reddy, Dr S.Prem Kumar, ,
Affiliations (M.Tech), CSE, Department of computer science and engineering.Assistant Professor, Department of computer science and engineering.Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Cloud provides services like data storage and data sharing in a group. Users can remotely store their data
on cloud and enjoy the on-demand high quality applications and services from a shared pool of configurable computing
resources, without the burden of local data storage and maintenance. But the management of the data and services may
not be fully trustworthy on cloud, as users no longer have physical possession of the outsourced personal data so data
integrity protection becomes a difficult task. Maintaining the integrity of shared data services where data is shared among
number of cloud user, is also a challenging task. This paper gives Efficient User Revocation in Dynamic Cloud Using
Proxy Server and for that it uses Homomorphic linear authenticator with random masking technique. Homomorphic
authenticable proxy resignature scheme with Panda public auditing mechanism checks shared data integrity along with
efficient user revocation. Furthermore, these mechanisms are able to support batch auditing by verifying multiple auditing
Pocha Nageswara Reddy,D.Jayanarayana Reddy,Dr S.Prem Kumar."Efficient User Revocation in Dynamic Cloud Using Proxy Server.". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 09,pp.552-557, SEPTEMBER - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I906.pdf,
Keywords : Proxy Server, privacy-preserving, public auditing, shared data, user revocation, cloud computing.
Boyang Wang, Baochun Li and Hui Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud”, IEEE Transactions on services computing, vol. 8, no. 1, January/February 2015.
B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, Proc. IEEE CLOUD, pp. 295-302, 2014.
H. Wang, “Proxy Provable Data Possession in Public Clouds”, IEEE Trans. Services Computing, vol. 6, no. 4, pp. 551-559, Oct.-Dec. 2013.
C. Wang, Q. Wang, K. Ren ,“Privacy-Preserving Public Auditing for Secure Cloud Storage Auditing”, IEEE transaction on computer, 2013.
C. Wang, Q. Wang, K. Ren, and W. Lou, “PrivacyPreserving Public Auditing for Data Storage Security in Cloud Computing”, Proc. IEEE INFOCOM, pp. 525-533, 2010.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing”,Proc. 14th European Conf. Research in Computer Security (ESORICS09), pp. 355- 370, 2009.
H. Shacham and B. Waters, “Compact Proofs of Retrievability”, Proc. 14th Intl Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT08), pp. 90-107, 2008.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, LKissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores”, Proc. 14th ACM Conf. Computer and Comm. Security (CCS07), pp. 598-610, 2007.
Shamir, “How to Share a Secret”, Comm. ACM, vol. 22, no. 11,pp. 612-613, Nov. 1979.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.