CFP last date
22 April 2024
Reseach Article

A Novel Privacy Preserving Public Appraising Mechanism for Shared Data Distribution in the Cloud

by Kirti Panmand, Sandeep Kadam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 6
Year of Publication: 2015
Authors: Kirti Panmand, Sandeep Kadam
10.5120/20342-2195

Kirti Panmand, Sandeep Kadam . A Novel Privacy Preserving Public Appraising Mechanism for Shared Data Distribution in the Cloud. International Journal of Computer Applications. 116, 6 ( April 2015), 30-33. DOI=10.5120/20342-2195

@article{ 10.5120/20342-2195,
author = { Kirti Panmand, Sandeep Kadam },
title = { A Novel Privacy Preserving Public Appraising Mechanism for Shared Data Distribution in the Cloud },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 6 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number6/20342-2195/ },
doi = { 10.5120/20342-2195 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:22.666936+05:30
%A Kirti Panmand
%A Sandeep Kadam
%T A Novel Privacy Preserving Public Appraising Mechanism for Shared Data Distribution in the Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 6
%P 30-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud server is a model for enabling suitable, on-demand network access to a shared pool of resources that can be rapidly provisioned and released with cloud service provider communication. However, public appraising for such shared data while conserving uniqueness of system leftovers to be an open challenge. In this paper, the first privacy-conserving mechanism is proposed that allows public appraising on shared data stored in the cloud. In this, ring signature mechanism is used to calculate the authentication information needed to audit the integrity of shared data. With the help of this mechanism, the uniqueness of the signer on each block in shared data is kept secret from a third party auditor (TPA), who is still able to authenticate the integrity of shared data without accessing the complete file.

References
  1. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010.
  2. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," inProc. ACM Conference on Computer and Communications Security (CCS), 2007, pp. 598–610.
  3. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," inProc. IEEE International Conference on Computer Communications(INFOCOM), 2010, pp. 525–533.
  4. R. L. Rivest, A. Shamir, and Y. Tauman, "How to Leak a Secret," inProc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Springer-Verlag, 2001, pp. 552–565.
  5. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," in Proc. International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, 2003, pp. 416–432.
  6. H. Shacham and B. Waters, "Compact Proofs of Retrievability," inProc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Springer-Verlag, 2008, pp. 90–107.
  7. Y. Zhu, H. Wang, Z. Hu, G. -J. Ahn, H. Hu, and S. S. Yau, "Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds," in Proc. ACM Symposium on Applied Computing (SAC), 2011, pp. 1550–1557.
  8. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," in Proc. International Conference on Security and Privacy in Communication Networks(SecureComm), 2008.
  9. C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. IEEE/ACM International Workshop on Quality of Service (IWQoS), 2009, pp. 1–9.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud server public appraising shared data integrity