Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage
Pages : 1100-1103
Download PDF
Abstract
Remote knowledge integrity checking (RDIC) allows an information storage server, say a cloud server, to convince a verifier that it’s truly storing a knowledge owner’s data honestly. To date, variety of RDIC protocols are projected within the literature, however most of the constructions suffer from the difficulty of a posh key management, that is, they consider the overpriced public key infrastructure (PKI), which could hinder the preparation of RDIC in follow. during this paper, we have a tendency to propose a replacement construction of identity-based (IDbased) RDIC protocol by creating use of keyhomomorphic cryptologic primitive to cut back the system complexness and also the value for establishing and managing the general public key authentication framework in PKI based mostly RDIC schemes. we have a tendency to formalize ID-based RDIC and its security model as well as security against a malicious cloud server and 0 data privacy against a 3rd party protagonist. The projected ID-based RDIC protocol leaks no data of the hold on knowledge to the verifier throughout the RDIC method. The new construction is established secure against the malicious server within the generic cluster model and achieves zero data privacy against a verifier. intensive security analysis and implementation results demonstrate that the projected protocol is demonstrably secure and sensible within the real-world applications. we have a tendency to Extend This work with cluster Management with Forward Secrecy & Backward Secrecy by Time period & Recovery of File once knowledge Integrity Checking Fault Occur.
Keywords: Public integrity auditing Dynamic data, vector commitment, Group signature, Cloud computing.