Call for Paper - May 2021 Edition
IJCA solicits original research papers for the May 2021 Edition. Last date of manuscript submission is April 20, 2021. Read More

Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 114 - Number 12
Year of Publication: 2015
Authors:
Annamalai R
Srikanth J
M Prakash
10.5120/20029-1945

Annamalai R, Srikanth J and M Prakash. Article: Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature. International Journal of Computer Applications 114(12):13-18, March 2015. Full text available. BibTeX

@article{key:article,
	author = {Annamalai R and Srikanth J and M Prakash},
	title = {Article: Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {114},
	number = {12},
	pages = {13-18},
	month = {March},
	note = {Full text available}
}

Abstract

Data integrity is the protection of information from damage or deliberate manipulation. Large Scale image datasets are being shared exponentially. When these are outsourced in the cloud, compression and decompression of the images is required. Though images stored in the cloud can be shared across multiple users, the integrity of this shared data is prone to hardware or software failures and human errors. Previously designed techniques enable both data owners and public verifiers to efficiently audit the integrity without retrieving the entire data, butrevealing confidential information such as privacy identity. Auto Image compression and decompression from the cloud server eases the work of users. This paper proposes public auditing by exploiting ring signatures to compute verification metadata for preserving integrity. The signer's identity on each block is kept private from public verifiers who verify shared data integrity without requiring compressing and decompressing large image files which is automated through BCIF framework. The ring layout also enables simultaneous multiple auditing.

References

  • Dr. Sandeep Sharma&Navdeep Kaur Khiva Pune University, India Secure Cloud Architecture for Preserving Privacy in CloudComputing using OTP/WTP Global Journals Inc. (USA) Volume 13 Issue 3 Version 1. 0 Year 2013
  • Sathiskumar R1, Dr. Jeberson Retnaraj2, Secure Privacy Preserving Public Auditing for Cloud storage ,IJIRSET Volume 3, Special Issue 1, January 2014
  • M. Kavitha Margret, Secure Policy Based Data Sharing for Dynamic Groups in the Cloud,(IJARCET)Volume 2, Issue 6, June 2013
  • B. Wang, B. Li, and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," Proc. IEEE Fifth Int'l Conf. Cloud Computing, pp. 295-302, 2012
  • K. Ren, C. Wang, and Q. Wang, "Security Challenges for the PublicCloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
  • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,"Proc. IEEE INFOCOM, pp. 525-533, 2010.
  • Stefano Brocchi and Elena Bracucci , Department of Systems and Computer Science university of Florence,Italy , bcif: another algorithim for lossless true colour image compression.