Preserving Privacy in Public Auditing for Shared Cloud Data

被引:0
|
作者
Anjali, R. S. [1 ]
Ravikumar, Aswathy [1 ]
机构
[1] Mar Baselios Coll Engn & Technol, Dept Comp Sci & Engn, Trivandrum, Kerala, India
来源
2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2 | 2016年
关键词
Public auditing; distributed data; cloud computing; privacy-preserving;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A cloud service provider propose a secure, scalable and suitable surroundings for the cloud users at low expenditure. With the help of data storage services, cloud becomes a best location for the data users to accumulate their data into the cloud and also distribute around many users. The great challenge in cloud technology is to maintain the data security and identity privacy of users involved in the public auditing mechanism. The public auditing scheme will expose the secret data content and users identity privacy to external verifiers. To overcome the privacy issue an ORUTA (One Ring to Rule Them All) scheme is used to preserve the privacy of users and help the auditing process on distributed data that is accumulate in the cloud. ORUTA scheme includes ring signature that is essential to hide the users identity on distributed resources. Using ORUTA scheme, the identity of user on every file is kept under confidential or hidden from external auditors. External auditors are capable to examine the distributed data accuracy without getting the whole file. The ORUTA scheme provides data security and identity privacy of users while auditing the distributed data in cloud.
引用
收藏
页码:11 / 16
页数:6
相关论文
共 50 条
  • [1] Privacy preserving auditing for shared data in cloud
    Ghutugade, Kalyani B.
    Patil, G. A.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 300 - 305
  • [2] Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (01) : 43 - 56
  • [3] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491
  • [4] Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
    Wang, Boyang
    Li, Hui
    Li, Ming
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [5] Privacy-Preserving Public Auditing for Shared Cloud Data With Secure Group Management
    Kim, Dongmin
    Kim, Kee Sung
    IEEE ACCESS, 2022, 10 : 44212 - 44223
  • [6] Privacy-preserving public auditing for data integrity in cloud
    Saleem, M. Shaik
    Murali, M.
    PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [7] Identity-Preserving Public Auditing for Shared Cloud Data
    He, Kai
    Huang, Chuanhe
    Yang, Kan
    Shi, Jiaoli
    2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2015, : 159 - 164
  • [8] ENSURING PRIVACY AND DATA FRESHNESS FOR PUBLIC AUDITING OF SHARED DATA IN CLOUD
    Trueman, Tina Esther
    Narayanasamy, P.
    2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2016, : 22 - 27
  • [9] Privacy-preserving auditing scheme for shared data in public clouds
    Libing Wu
    Jing Wang
    Sherali Zeadally
    Debiao He
    The Journal of Supercomputing, 2018, 74 : 6156 - 6183
  • [10] Privacy-preserving auditing scheme for shared data in public clouds
    Wu, Libing
    Wang, Jing
    Zeadally, Sherali
    He, Debiao
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 6156 - 6183