Loading

Efficient User Revocation for Shared Data in the Public Cloud
Achintaya Saha1, S. Suresh Kumar2

1Achintaya Saha, Final Year CSE, Priest University, Chennai, India.
2S. Suresh Kumar, M.E., PhD(pursuing), Assistant Professor, Prist University, Tamil Nadu, India.

Manuscript received on 03 July 2019 | Revised Manuscript received on 08 July 2019 | Manuscript published on 30 August 2019 | PP: 1302-1307 | Volume-8 Issue-10, August 2019 | Retrieval Number: I7899078919/2019©BEIESP | DOI: 10.35940/ijitee.I7899.0881019
Open Access | Ethics and  Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In cloud computing user can easily share and modify data inside group. Here data integrity can be easily ensured by using the public signature of existing users in the cloud group. By using data sharing services in cloud user can able modify data as a group on cloud. Integrity of these services can be improved using signature of public existing users on group. Shared data is divided into blocks. All users are responsible for modifying data on different blocks. When any user shows malicious activity in group then that user must be revoked for security purpose. So the block modified by that user must be re-signing by existing users in group. Traditional way to re-sign this is to down load part of data and re-sign it at the time of revocation of user. But this approach is not efficient for large amount of data being shared. This paper gives novel method for auditing integrity of shared data and provides effective way for user revocation. It uses the concept of proxy re-signature to avoid the downloading of re-signed block by existing user.
Keywords: Public auditing, shared data, user revocation, cloud computing.
Scope of the Article: Cloud Computing