Auditing For Shared Dynamic Cloud Data with Group User Revocation

被引:0
作者
Riyaz, T. [1 ]
Saritha, S. J. [2 ]
机构
[1] JNTUA Coll Engn, CSE, Pulivendula, AP, India
[2] JNT Univ, Dept CSE, Anantapur, AP, India
来源
PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES) | 2016年
关键词
Cloud computing; dynamic data; group signature;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The advent of cloud computing technology makes the storage outsourcing grow to be a rising form, which inspires the comfortable remote data auditing. As of late some exploration bear in mind the predicament of secure and proficient public data credibility inspecting for shared element data. Alternatively, these plans are nonetheless secure in opposition to the intrigue of cloud storage server and denied workforce clients in the course of consumer revocation in functional cloud storage framework In this paper, we make feel of the collusion attack in the existed method and give an efficient public integrity auditing scheme with secure group user revocation based on in on vector commitment and verifier-local revocation group signature.
引用
收藏
页码:378 / 380
页数:3
相关论文
共 11 条
  • [1] Anderson PO, 2010, PHARMACY INFORMATICS, P1, DOI 10.1145/1852658.1852665
  • [2] [Anonymous], 2012, NISTS POLICY HASH FU
  • [3] Armbrust M., 2009, Technical Report No. UCB/EECS-2009-28, P1
  • [4] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [5] Bellare M., 2012, P IACR CRYPT EPRINT
  • [6] Blakley C., 1985, Advances in Cryptology, P242
  • [7] Bowers KevinD., 2009, Proc. of ACM-CCSW '09, P43, DOI DOI 10.1145/1655008.1655015
  • [8] Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
  • [9] Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
  • [10] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584