Public auditing using identity based cryptosystems on multi-copy data integrity in cloud (Record no. 19053)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20230327115920.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 230327b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 20288 |
| Author | Hariharan, R. |
| 245 ## - TITLE STATEMENT | |
| Title | Public auditing using identity based cryptosystems on multi-copy data integrity in cloud |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.13(3), Sep |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Chennai |
| Name of publisher, distributor, etc. | ICT Academy |
| Year | 2022 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 2748-2752p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cloud computing relies on a reliable and secure storage system. A<br/>cloud auditing technique is used by customers to ensure that their<br/>information is safe and secure while being stored in the cloud.<br/>However, no matter how sophisticated the auditing procedures are,<br/>cloud auditing will be rendered useless if the cloud service provider<br/>(CSP) learns in order of obtaining the secret key. The secret keys of<br/>auditing is prevented if it occur, the damage must be minimised. Cloud<br/>auditing is resistant on the Public Key Infrastructure (PKI) and face<br/>difficulties in managing and verifying certificates. In addition, these<br/>techniques require a lot of computing time to data block integrity.<br/>Although certificates are eliminated, the damage caused by key<br/>disclosure is limited preceding the identity-based schemes. In this<br/>paper, we develop a bilinear pairings based Identity-based cloud<br/>auditing, where the system is set up using the PDP model. Neither the<br/>key update time nor the number of time periods affect the algorithm<br/>execution time. The public keys are all the same. This strategy reduces<br/>the calculation time for blockless verification. Second, the client<br/>constant monitoring of audit reports ensures that the TPA does not get<br/>any information from the stored file. Batch auditing is now planned.<br/>As a result, TPA audits become even more efficient. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4619 |
| Topical term or geographic name entry element | EXTC Engineering |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 20289 |
| Co-Author | Komarasamy, G. |
| 773 0# - HOST ITEM ENTRY | |
| International Standard Serial Number | 0976-0091 |
| Place, publisher, and date of publication | Chennai ICT Academy |
| Title | ICTACT journal on communication technology |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://ictactjournals.in/paper/IJCT_Vol_13_Iss_3_Paper_5_2748_2752.pdf |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 27/03/2023 | 2023-0524 | 27/03/2023 | 27/03/2023 | Articles Abstract Database |