CFP last date
22 April 2024
Reseach Article

Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature

by Annamalai R, Srikanth J, M Prakash
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 12
Year of Publication: 2015
Authors: Annamalai R, Srikanth J, M Prakash
10.5120/20029-1945

Annamalai R, Srikanth J, M Prakash . Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature. International Journal of Computer Applications. 114, 12 ( March 2015), 13-18. DOI=10.5120/20029-1945

@article{ 10.5120/20029-1945,
author = { Annamalai R, Srikanth J, M Prakash },
title = { Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 12 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number12/20029-1945/ },
doi = { 10.5120/20029-1945 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:52:34.003940+05:30
%A Annamalai R
%A Srikanth J
%A M Prakash
%T Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 12
%P 13-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data integrity is the protection of information from damage or deliberate manipulation. Large Scale image datasets are being shared exponentially. When these are outsourced in the cloud, compression and decompression of the images is required. Though images stored in the cloud can be shared across multiple users, the integrity of this shared data is prone to hardware or software failures and human errors. Previously designed techniques enable both data owners and public verifiers to efficiently audit the integrity without retrieving the entire data, butrevealing confidential information such as privacy identity. Auto Image compression and decompression from the cloud server eases the work of users. This paper proposes public auditing by exploiting ring signatures to compute verification metadata for preserving integrity. The signer's identity on each block is kept private from public verifiers who verify shared data integrity without requiring compressing and decompressing large image files which is automated through BCIF framework. The ring layout also enables simultaneous multiple auditing.

References
  1. Dr. Sandeep Sharma&Navdeep Kaur Khiva Pune University, India Secure Cloud Architecture for Preserving Privacy in CloudComputing using OTP/WTP Global Journals Inc. (USA) Volume 13 Issue 3 Version 1. 0 Year 2013
  2. Sathiskumar R1, Dr. Jeberson Retnaraj2, Secure Privacy Preserving Public Auditing for Cloud storage ,IJIRSET Volume 3, Special Issue 1, January 2014
  3. M. Kavitha Margret, Secure Policy Based Data Sharing for Dynamic Groups in the Cloud,(IJARCET)Volume 2, Issue 6, June 2013
  4. B. Wang, B. Li, and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," Proc. IEEE Fifth Int'l Conf. Cloud Computing, pp. 295-302, 2012
  5. K. Ren, C. Wang, and Q. Wang, "Security Challenges for the PublicCloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
  6. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,"Proc. IEEE INFOCOM, pp. 525-533, 2010.
  7. Stefano Brocchi and Elena Bracucci , Department of Systems and Computer Science university of Florence,Italy , bcif: another algorithim for lossless true colour image compression.
Index Terms

Computer Science
Information Sciences

Keywords

Large Scale Image Integrity Ring Signature system Owner-Identity Confidentiality for Large Scale Image Public Verification