CFP last date
20 May 2024
Reseach Article

Group User Revocation and Integrity Auditing of Shared Data in Cloud Environment

by Pushkar Zagade, Shruti Yadav, Aishwarya Shah, Ravindra Bachate
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 12
Year of Publication: 2015
Authors: Pushkar Zagade, Shruti Yadav, Aishwarya Shah, Ravindra Bachate
10.5120/ijca2015906681

Pushkar Zagade, Shruti Yadav, Aishwarya Shah, Ravindra Bachate . Group User Revocation and Integrity Auditing of Shared Data in Cloud Environment. International Journal of Computer Applications. 128, 12 ( October 2015), 22-25. DOI=10.5120/ijca2015906681

@article{ 10.5120/ijca2015906681,
author = { Pushkar Zagade, Shruti Yadav, Aishwarya Shah, Ravindra Bachate },
title = { Group User Revocation and Integrity Auditing of Shared Data in Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 12 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number12/22925-2015906681/ },
doi = { 10.5120/ijca2015906681 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:21:26.453487+05:30
%A Pushkar Zagade
%A Shruti Yadav
%A Aishwarya Shah
%A Ravindra Bachate
%T Group User Revocation and Integrity Auditing of Shared Data in Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 12
%P 22-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The enhancement of cloud computing make storage outsourcing becomes an exceeding trend, which result a secure data auditing a cool topic that emerge in research literature. Recently some researches consider the problem of efficient and secure public data authentication inspection for shared dynamic data. However, these schemes are still not secure against the collusion and leakage of cloud storage server from unauthorized attacker and revoked group users during user revocation in cloud storage system. In this paper, there will be auditing the integrity of shared data with dynamic groups in cloud. A new user can be added into the group and an existing group member can be revoked by preserving privacy including data backup based on vector commitment and verifier-local revocation group signature. This scheme supports the public validation and efficient user revocation and also some nice properties such as traceability, efficiency, confidently, countability. Finally, the security and experimental analysis show that our scheme is also secure and efficient.

References
  1. T. Jiang, X. Chen, and J. Ma, “Public integrity auditing for shared dynamic cloud data with group user revocation,” in Proc. Of IEEE TRANSACTIONS ON COMPUTERS VOL: PP NO: 99 YEAR 2015
  2. Hugo E. Camacho, J. Alfredo Brambila, Alfredo Peña, José M. Vargas, “A cloud environment for backup and data storage,” in Engineering Information Technology, Polytechnic University of Altamira, Altamira Tamaulipas, México
  3. Jin Li, Yan Kit Li, X. Chen, Patrick P. C. Lee, Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorize Deduplication,” in Proc. of IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEM VOL:PP NO:99 YEAR 2014
  4. Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE, ” Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud” in Proc. Of IEEE TRANSACTIONS ON XXXXXX, VOL. X, NO. X, XXXX 201X
  5. C. Wang Student Member, IEEE, Sherman S.-M. Chow, Q. Wang, Student Member, IEEE, K. Ren, Member, IEEE, and W. Lou, Member, IEEE , “Privacy-Preserving Public Auditing for Secure Cloud Storage”.
  6. B. Wang, B. Li, Member, IEEE, and H. Li, “Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud” in Proc. Of IEEE TRANSACTIONS ON XXXXXX, VOL. X, NO. X, XXXX 201X
  7. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp. 525– 533.
  8. D. Catalano and D. Fiore, “Vector commitments and their applications,” in Public-Key Cryptography - PKC 2013, Nara, Japan, Mar. 2013, pp. 55–72.
  9. B. Wang, L. Baochun, and L. Hui, “Public auditing for shared data with efficient user revocation in the cloud,” in Proc. Of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013, pp. 2904–2912
Index Terms

Computer Science
Information Sciences

Keywords

Public integrity auditing dynamic data cloud computing.