News Updates Thursday 26th Dec 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage


Author : Miss. Komal Satam and Prof. Santosh Biradar

Pages : 1100-1103
Download PDF
Abstract

Remote knowledge integrity checking (RDIC) allows an information storage server, say a cloud server, to convince a verifier that it’s truly storing a knowledge owner’s data honestly. To  date, variety of RDIC protocols are projected within the literature, however most of the constructions suffer from the difficulty of a posh key management, that is, they consider the overpriced public key infrastructure (PKI), which could hinder the preparation of RDIC in follow. during this paper, we have a tendency to propose a replacement construction of identity-based (IDbased) RDIC protocol by creating use of keyhomomorphic cryptologic primitive to cut back the system complexness and also the value for establishing and managing the general public key authentication framework in PKI based mostly RDIC schemes. we have a tendency to formalize ID-based RDIC and its security model as well as security against a malicious cloud server and 0 data privacy against a 3rd party protagonist. The projected ID-based RDIC protocol leaks no data of the hold on knowledge to the verifier throughout the RDIC method. The new construction is established secure against the malicious server within the generic cluster model and achieves zero data privacy against a verifier. intensive security analysis and implementation results demonstrate that the projected protocol is demonstrably secure and sensible within the real-world applications. we have a tendency to Extend This work with cluster Management with Forward Secrecy & Backward Secrecy by Time period & Recovery of File once knowledge Integrity Checking Fault Occur.

Keywords: Public integrity auditing Dynamic data, vector commitment, Group signature, Cloud computing.

Call for Papers
  1. IJCET- Current Issue
  2. Issues are published in Feb, April, June, Aug, Oct and Dec
  3. DOI is given to all articles
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved