Ensure Data Integrity Via Batch Auditing Group Ring Signature Verification

J. Shiny*
Department of Computer Science and Engineering, DMI Engineering College, Aralvaimozhi, Tamil Nadu, India.
Periodicity:December - February'2021
DOI : https://doi.org/10.26634/jit.10.1.18403

Abstract

Cloud service providers offer cost-effective, scalable data storage for a fraction of the cost of alternatives. Cloud resources are often shared by a large number of people, but they are also dynamically reallocated based on demand. Due to human error and hardware/software problems, cloud data integrity is questionable. Several methods have been developed by data holders and public verifiers to effectively verify the integrity of cloud data without retrieving all of the data from the cloud server. However, using these current methods, the general public may check the integrity of shared data. This technique for protecting privacy allows for a batch audit of cloud-stored common data. Using group signatures to ensure shared data correctness while calculating metadata. The identity of private information is unknown to public verifiers. Public verifiers in each shared data block preserve the identity of the signer using this privacy method. This protects the sensitive user data very well. Cloud storage audits may be loaded using this technique with ease, and it is also very cost-efficient and effective in its auditing.

Keywords

Cloud Computing, Group ring Signature, Third Party Administrator (TPA), Batch Auditing.

How to Cite this Article?

Shiny, S. J, (2021). Ensure Data Integrity Via Batch Auditing Group Ring Signature Verification. i-manager's Journal on Information Technology, 10(1), 1-9. https://doi.org/10.26634/jit.10.1.18403

References

[1]. Chaum D., & van Heyst, E. (1991). Group Signatures. In Davies D. W. (eds) Advances in Cryptology — EUROCRYPT '91, (pp. 257-265). https://doi.org/10.1007/3- 540-46416-6_22
[2]. Gayathri, K., Umamaheswari,P., & Senthilkumar, P. (2013). Enabling efficiency in data dynamics for storage security in cloud computing. International Journal of Advanced Research in Computer and Communication Engineering, 2(12), 1-5.
[3]. Jain, P., & Chouhan, J. S. (2021). Cloud computing security issues and web-service methods to overcome from security threats. Journal of Innovative Research in Computer and Communication Engineering, 1(1).
[4]. Okuhara, M., Shiozaki, T., & Suzuki, T. (2010). Security architecture for cloud computing. Fujitsu Scientific & Technical Journal, 46(4), 397-402.
[5]. Ramesh, R., & Revathy, N. (2017). Public auditing for shared data with efficient user revocation in the cloud. International Journal for Advance Research and Development, 2(5), 184-189.
[6]. Wang, C., Wang, Q., Ren, K., & Lou, W. (2010, March). Privacy-preserving public auditing for data storage security in cloud computing. In 2010, Proceedings IEEE Infocom (pp. 1-9). IEEE. https://doi.org/10.1109/INFCOM. 2010.5462173
[7]. Wang, B., Li, B., & Li, H. (2013). Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Transactions on Services Computing, 8(1), 92-106. https://doi.org/10.1109/TSC.2013.2295611
[8]. Wang, B., Li, B., & Li, H. (2014). Oruta: Privacypreserving public auditing for shared data in the cloud. IEEE Transactions on Cloud Computing, 2(1), 43-56. https://doi.org/10.1109/TCC.2014.2299807
[9]. Waykole, K., Deosthale, S., & Bansod, S. (2011). Secure dynamic groups auditing service with group signature for cloud storage. International Journal on Recent and Innovation Trends in Computing and Communication, 3(6), 4100-4103.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.