Local cover image
Local cover image
Image from Google Jackets

Public auditing using identity based cryptosystems on multi-copy data integrity in cloud

By: Contributor(s): Publication details: Chennai ICT Academy 2022Edition: Vol.13(3), SepDescription: 2748-2752pSubject(s): Online resources: In: ICTACT journal on communication technologySummary: Cloud computing relies on a reliable and secure storage system. A cloud auditing technique is used by customers to ensure that their information is safe and secure while being stored in the cloud. However, no matter how sophisticated the auditing procedures are, cloud auditing will be rendered useless if the cloud service provider (CSP) learns in order of obtaining the secret key. The secret keys of auditing is prevented if it occur, the damage must be minimised. Cloud auditing is resistant on the Public Key Infrastructure (PKI) and face difficulties in managing and verifying certificates. In addition, these techniques require a lot of computing time to data block integrity. Although certificates are eliminated, the damage caused by key disclosure is limited preceding the identity-based schemes. In this paper, we develop a bilinear pairings based Identity-based cloud auditing, where the system is set up using the PDP model. Neither the key update time nor the number of time periods affect the algorithm execution time. The public keys are all the same. This strategy reduces the calculation time for blockless verification. Second, the client constant monitoring of audit reports ensures that the TPA does not get any information from the stored file. Batch auditing is now planned. As a result, TPA audits become even more efficient.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Articles Abstract Database Articles Abstract Database School of Engineering & Technology Archieval Section Not for loan 2023-0524
Total holds: 0

Cloud computing relies on a reliable and secure storage system. A
cloud auditing technique is used by customers to ensure that their
information is safe and secure while being stored in the cloud.
However, no matter how sophisticated the auditing procedures are,
cloud auditing will be rendered useless if the cloud service provider
(CSP) learns in order of obtaining the secret key. The secret keys of
auditing is prevented if it occur, the damage must be minimised. Cloud
auditing is resistant on the Public Key Infrastructure (PKI) and face
difficulties in managing and verifying certificates. In addition, these
techniques require a lot of computing time to data block integrity.
Although certificates are eliminated, the damage caused by key
disclosure is limited preceding the identity-based schemes. In this
paper, we develop a bilinear pairings based Identity-based cloud
auditing, where the system is set up using the PDP model. Neither the
key update time nor the number of time periods affect the algorithm
execution time. The public keys are all the same. This strategy reduces
the calculation time for blockless verification. Second, the client
constant monitoring of audit reports ensures that the TPA does not get
any information from the stored file. Batch auditing is now planned.
As a result, TPA audits become even more efficient.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Share
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.