Privacy - Preserving Public Authentication for Shared Data in Cloud
نویسندگان
چکیده
Data security is an important in cloud. Access control is major issue to secure the stored data in cloud. Thus the proposing privacy preserving authenticated access control scheme for securing shared data in cloud. In the proposed scheme supports authenticated access control for anonymous user to share data on cloud also additional feature in access control which provides authentication for the user, in which only valid users are able to decrypt the stored information. User authentication and access control scheme are introduced in decentralized, which prevent replay attacks and also supports to creation, , and reading, modification data stored in the cloud. Implementation also provide feature user revocation.
منابع مشابه
Shared Data Based Privacy Preserving Authentication in Cloud for Public Auditing
With cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity witho...
متن کاملPrivacy-Preserving Public Auditing Scheme for Shared Data with Supporting Multi-function
most common concerns for users in cloud storage are data integrity, confidentiality and availability, so various data integrity auditing schemes for cloud storage have been proposed in the past few years, some of which achieve privacy-preserving public auditing, data sharing and group dynamic, or support data dynamic. However, as far as we know, until now yet there doesn't exist a practical aud...
متن کاملPrivacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code
Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...
متن کاملAn Efficient Data Security Mechanism in Cloud Computing Using Anonymous ID Algorithm
Cloud computing has evolved from a risky and confusing concept to a strategy that organization large and small are beginning to adopt as part of their to overall computing strategy. Cloud computing is a method of providing a set of shared computing resources that includes application, computing, storage, netorking, development and deployment platforms as well as business processes.. Research on...
متن کاملComparative Study on Preserving Data Integrity for Shared Data in Cloud Storage
A novel privacy-preserving mechanism that supports public auditing for shared data stored on cloud. “Ring Signatures” is a technique to compute authentication metadata required to review the accuracy of shared data. This mechanism precise that the identity of the signer on each block in shared data is hidden from public verifiers, who are able to proficiently verify shared data integrity withou...
متن کامل