Survey on Public Auditing and Revocation with Automatic Signature Computation in the Cloud

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-28 Number-2
Year of Publication : 2015
Authors : Amretha N.A, Fousiya Pareed, jamshidha.V.S, saliha.P.A, sameeha.P.A, Dr.Brilly Sangeetha.S
  10.14445/22312803/IJCTT-V28P118

MLA

Amretha N.A, Fousiya Pareed, jamshidha.V.S, saliha.P.A, sameeha.P.A, Dr.Brilly Sangeetha.S "Survey on Public Auditing and Revocation with Automatic Signature Computation in the Cloud". International Journal of Computer Trends and Technology (IJCTT) V28(2):104-106, October 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
cloud offers scalable, secure and reliable data storage, sharing service and modify data as a group. Different user in the group needs to sign their modified blocks in order to ensure data integrity. Resigning mechanism is performed by existing user whenever a user revocated from a group, due to reliability issues. During user revocation, it is difficult for an existing user to download and resign the corresponding part of shared data in the cloud. In our project is a new proxy re-signature method, which satisfies the property of block less verifiability and non-malleability. Based on the new proxy re-signature scheme we present PAACC- public auditing and revocation with automatic signature computation in the cloud. In our mechanism, the original user acts as the group manager, who is able to revoke users from the group when it is necessary. Here cloud act as a semi-trusted proxy and with re-signing keys it converts signatures for users in the group. In our mechanism, we assume the cloud has servers to store shared data and to manage re-signing keys.

References
[1] B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” Proc. IEEE INFOCOM, pp. 2904-2912, 2013.
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS’07), pp. 598-610, 2007.
[3] J. Yuan and S. Yu, “Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud,” Proc. ACM Int’l Workshop Security in Cloud Computing (ASIACCS-SCC’13), pp. 19- 26, 2013.
[4] C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards Secure and Dependable Storage Services in Cloud Computing,” IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Jan. 2012.
[5] Y. Zhu, G.-J. Ahn, H. Hu, S.S. Yau, H.G. An, and C.-J. Hu, “Dynamic Audit Services for Outsourced Storages in Clouds,” IEEE Trans. Services Computing, vol. 6, no. 2, pp. 227-238, Apr.- June 2013.
[6] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,” Proc. 14th European Conf. Research in Computer Security

Keywords
auditing, revocation, shared data, cloud computing.