Privacy Preserving Public Analyze for Mundane Information in Cloud

D. Chandana, S. Prathap

Abstract


When we are utilizing cloud storage accommodation, it is possible for data to be not only stored in the cloud, but with all can shared across multiple users. It’s a sizably voluminous challenge is to preserve identity privacy of public auditing for such shared data. It sanctions public auditing on shared data stored in the cloud by this first privacy preserving mechanism. For auditing the integrity of shared data it utilizes the ring signature to compute the verification information. The third party auditor is able to verify the integrity of shared data in the cloud. Hence, this is the mechanism who kept the identity of signer in shared data private from third party auditor. By utilizing the auditing shared data it demonstrates efficacy and efficiency.

Keywords


Cloud computing; Public auditing; Privacy-preserving; Shared data; Third Party Auditor

Full Text:

PDF




Copyright (c) 2015 D. Chandana, S. Prathap

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org