Public auditing using identity based cryptosystems on multi-copy data integrity in cloud (Record no. 19053)

MARC details
000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230327115920.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230327b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 20288
Author Hariharan, R.
245 ## - TITLE STATEMENT
Title Public auditing using identity based cryptosystems on multi-copy data integrity in cloud
250 ## - EDITION STATEMENT
Volume, Issue number Vol.13(3), Sep
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Chennai
Name of publisher, distributor, etc. ICT Academy
Year 2022
300 ## - PHYSICAL DESCRIPTION
Pagination 2748-2752p.
520 ## - SUMMARY, ETC.
Summary, etc. Cloud computing relies on a reliable and secure storage system. A<br/>cloud auditing technique is used by customers to ensure that their<br/>information is safe and secure while being stored in the cloud.<br/>However, no matter how sophisticated the auditing procedures are,<br/>cloud auditing will be rendered useless if the cloud service provider<br/>(CSP) learns in order of obtaining the secret key. The secret keys of<br/>auditing is prevented if it occur, the damage must be minimised. Cloud<br/>auditing is resistant on the Public Key Infrastructure (PKI) and face<br/>difficulties in managing and verifying certificates. In addition, these<br/>techniques require a lot of computing time to data block integrity.<br/>Although certificates are eliminated, the damage caused by key<br/>disclosure is limited preceding the identity-based schemes. In this<br/>paper, we develop a bilinear pairings based Identity-based cloud<br/>auditing, where the system is set up using the PDP model. Neither the<br/>key update time nor the number of time periods affect the algorithm<br/>execution time. The public keys are all the same. This strategy reduces<br/>the calculation time for blockless verification. Second, the client<br/>constant monitoring of audit reports ensures that the TPA does not get<br/>any information from the stored file. Batch auditing is now planned.<br/>As a result, TPA audits become even more efficient.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4619
Topical term or geographic name entry element EXTC Engineering
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 20289
Co-Author Komarasamy, G.
773 0# - HOST ITEM ENTRY
International Standard Serial Number 0976-0091
Place, publisher, and date of publication Chennai ICT Academy
Title ICTACT journal on communication technology
856 ## - ELECTRONIC LOCATION AND ACCESS
URL https://ictactjournals.in/paper/IJCT_Vol_13_Iss_3_Paper_5_2748_2752.pdf
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     School of Engineering & Technology School of Engineering & Technology Archieval Section 27/03/2023   2023-0524 27/03/2023 27/03/2023 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.