{"title":"云中有效用户终端获取共享数据完整性的研究","authors":"N. Shyamambika, N. Thillaiarasu","doi":"10.1109/ISCO.2016.7726893","DOIUrl":null,"url":null,"abstract":"Cloud computing is a term that refers Internet based development and services. These services are remotely hosted, ubiquitous and commoditized. The problem within the cloud computing includes security, policy access and integrity i.e. data or information correctness. Cloud service suppliers could hoodwink verifiers concerning the incorrectness of shared information so as to save the reputation of its data services and avoid losing money on its data services. This paper, we project a new public auditing mechanism for shared data with economical user revocation within the cloud using a Third Party Auditor. Once the user within the group is revoked, we enable the semi-trusted cloud to re-sign blocks that were signed by the revoked user with proxy signatures. Experimental results show that the cloud can improve the potency of user revocation, and existing users in the group can save a big quantity of computation and communication resources during user revocation. Thus we build use of login with secret key in each time conjointly a security question for the user.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"A survey on acquiring integrity of shared data with effective user termination in the cloud\",\"authors\":\"N. Shyamambika, N. Thillaiarasu\",\"doi\":\"10.1109/ISCO.2016.7726893\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is a term that refers Internet based development and services. These services are remotely hosted, ubiquitous and commoditized. The problem within the cloud computing includes security, policy access and integrity i.e. data or information correctness. Cloud service suppliers could hoodwink verifiers concerning the incorrectness of shared information so as to save the reputation of its data services and avoid losing money on its data services. This paper, we project a new public auditing mechanism for shared data with economical user revocation within the cloud using a Third Party Auditor. Once the user within the group is revoked, we enable the semi-trusted cloud to re-sign blocks that were signed by the revoked user with proxy signatures. Experimental results show that the cloud can improve the potency of user revocation, and existing users in the group can save a big quantity of computation and communication resources during user revocation. Thus we build use of login with secret key in each time conjointly a security question for the user.\",\"PeriodicalId\":320699,\"journal\":{\"name\":\"2016 10th International Conference on Intelligent Systems and Control (ISCO)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 10th International Conference on Intelligent Systems and Control (ISCO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCO.2016.7726893\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCO.2016.7726893","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A survey on acquiring integrity of shared data with effective user termination in the cloud
Cloud computing is a term that refers Internet based development and services. These services are remotely hosted, ubiquitous and commoditized. The problem within the cloud computing includes security, policy access and integrity i.e. data or information correctness. Cloud service suppliers could hoodwink verifiers concerning the incorrectness of shared information so as to save the reputation of its data services and avoid losing money on its data services. This paper, we project a new public auditing mechanism for shared data with economical user revocation within the cloud using a Third Party Auditor. Once the user within the group is revoked, we enable the semi-trusted cloud to re-sign blocks that were signed by the revoked user with proxy signatures. Experimental results show that the cloud can improve the potency of user revocation, and existing users in the group can save a big quantity of computation and communication resources during user revocation. Thus we build use of login with secret key in each time conjointly a security question for the user.