000 a
999 _c19053
_d19053
003 OSt
005 20230327115920.0
008 230327b xxu||||| |||| 00| 0 eng d
040 _aAIKTC-KRRC
_cAIKTC-KRRC
100 _920288
_aHariharan, R.
245 _aPublic auditing using identity based cryptosystems on multi-copy data integrity in cloud
250 _aVol.13(3), Sep
260 _aChennai
_bICT Academy
_c2022
300 _a2748-2752p.
520 _aCloud computing relies on a reliable and secure storage system. A cloud auditing technique is used by customers to ensure that their information is safe and secure while being stored in the cloud. However, no matter how sophisticated the auditing procedures are, cloud auditing will be rendered useless if the cloud service provider (CSP) learns in order of obtaining the secret key. The secret keys of auditing is prevented if it occur, the damage must be minimised. Cloud auditing is resistant on the Public Key Infrastructure (PKI) and face difficulties in managing and verifying certificates. In addition, these techniques require a lot of computing time to data block integrity. Although certificates are eliminated, the damage caused by key disclosure is limited preceding the identity-based schemes. In this paper, we develop a bilinear pairings based Identity-based cloud auditing, where the system is set up using the PDP model. Neither the key update time nor the number of time periods affect the algorithm execution time. The public keys are all the same. This strategy reduces the calculation time for blockless verification. Second, the client constant monitoring of audit reports ensures that the TPA does not get any information from the stored file. Batch auditing is now planned. As a result, TPA audits become even more efficient.
650 0 _94619
_aEXTC Engineering
700 _920289
_aKomarasamy, G.
773 0 _x0976-0091
_dChennai ICT Academy
_tICTACT journal on communication technology
856 _uhttps://ictactjournals.in/paper/IJCT_Vol_13_Iss_3_Paper_5_2748_2752.pdf
_yClick here
942 _2ddc
_cAR