A Novel Architecture of Cloud Computing By User Revocation

T. HARIPRASAD, N. ASHOK

Abstract


The advent of the cloud computing makes storage outsourcing becomes a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. Recently some research considers the problem of secure and efficient public data integrity auditing for shared dynamic data. However, these schemes are still not secure against the collusion of cloud storage server and revoked group users during user revocation in practical cloud storage system. Here I figure out the collusion attack in the exiting scheme and provide an efficient public integrity auditing scheme with secure group user revocation based on vector commitment and verifier-local revocation group signature. In existing system, Kallahalla et al presented a cryptographic storage system that enables secure data sharing on untrustworthy servers based on the techniques that dividing files into file groups and encrypting each file group with a file-block key. ECC is a really amazing public key cipher that uses only basic number in its description. However, whenever a new cipher appears there will be many people that test its security and whenever possible will try to break it. So far ECC has not been broken but certain bad things can happen with it if we are not careful. As well as key size is also too length. Proposed system can achieve fine-grained access control. Registered users can use the source in the cloud and revoked users cannot access the cloud. The revoked users cannot get the original data even if they conspire with the cloud, so the system can be protected from collusion attack. Proposed system is able to support dynamic groups efficiently, when a new user joins in the group or a user is revoked from the group, the private keys of the other users do not need to be recomputed and updated. The primary benefit promised by Paillier cryptosystem is a similar key size, reducing storage and transmission requirements, and it provides the same level of security afforded by an ECC-based system with a large modulus and correspondingly larger key.


Full Text:

PDF




Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org