Vineet Kumar Singh, N. Bharathiraja, S. Arun, D. Stalin David, R. Krishnamoorthy, R. Thiagarajan
{"title":"Secure Shared Data in the Private Cloud With an EA Algorithm","authors":"Vineet Kumar Singh, N. Bharathiraja, S. Arun, D. Stalin David, R. Krishnamoorthy, R. Thiagarajan","doi":"10.1109/ICSSS54381.2022.9782299","DOIUrl":null,"url":null,"abstract":"Cloud computing allows users to save personal data on a server while maintaining privacy. Because data owners outsource their information to the cloud, data validation and confidentiality have become a severe issue. To avoid this manipulation, a cloud supplied certificate to all ordinary person who accesses information in the cloud. Once the client revises the report, the CSP must ensure that the certificate is presented on that given chunk. If the user is rescinded from trying to access the cloud, the accessible data center users must provide notice to the data agreed to sign by the invalidated user. This problem is solved using the proxy signature's novel public auditing approach. Furthermore, data protection is improved with the help of a public verifier to evaluate the integrity of data without getting the complete data on or after the cloud. We present an Efficient Auditing (EA) method for security auditing and user revocation in the private cloud. This work also explains the data integrity inspection design for cloud users that is characterized by multi-user modifications, collusion tolerance, and a consistent consistency checking computing cost. Our system is also entirely secure and supports public verification and quick user deactivation.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSS54381.2022.9782299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud computing allows users to save personal data on a server while maintaining privacy. Because data owners outsource their information to the cloud, data validation and confidentiality have become a severe issue. To avoid this manipulation, a cloud supplied certificate to all ordinary person who accesses information in the cloud. Once the client revises the report, the CSP must ensure that the certificate is presented on that given chunk. If the user is rescinded from trying to access the cloud, the accessible data center users must provide notice to the data agreed to sign by the invalidated user. This problem is solved using the proxy signature's novel public auditing approach. Furthermore, data protection is improved with the help of a public verifier to evaluate the integrity of data without getting the complete data on or after the cloud. We present an Efficient Auditing (EA) method for security auditing and user revocation in the private cloud. This work also explains the data integrity inspection design for cloud users that is characterized by multi-user modifications, collusion tolerance, and a consistent consistency checking computing cost. Our system is also entirely secure and supports public verification and quick user deactivation.