Enhanced Technique for Privacy Preserving Public Auditing for Shared Data in Cloud

Jyothi Kannan, Leda Kamal
2015 International Journal of Engineering Research and  
Cloud computing, often referred to as simply "the cloud," is the delivery of on-demand computing resources everything from applications to data centers over the Internet on a pay-for-use basis. Cloud storage is a very important service of cloud computing. It provides owners to maneuver information from their native computing systems to the cloud. More and more owners begin to store the data in the cloud. By utilizing Cloud storage, users can access applications, services, software every time
more » ... y requires within the internet. Users can put their data remotely to cloud storage and get advantageous asset of on-demand services and application from the resources. The cloud will need to have to make certain data integrity and security of data of user. In Cloud Computing Public auditing on the integrity of shared data is extremely major problem, because the public auditing scheme will predictably reveal confidential information, and identity privacy to public verifiers. This survey, propose a fresh scheme called a novel privacypreserving mechanism which supports public auditing on shared data stored in the cloud. Specifically, this scheme takes benefit of ring signatures to compute verification metadata. The ring signature scheme is necessary to audit the correctness of shared data. With this particular mechanism, the identity of the signer on each block in shared data is kept secret or private from public verifiers. Public verifiers are person who are able the whole file. Furthermore, this mechanism has the capacity to perform multiple auditing tasks simultaneously as opposed to single auditing task using Batch Auditing. This survey shows the effectiveness and efficiency of our mechanism when auditing shared data integrity.
doi:10.17577/ijertv4is030384 fatcat:qsaryjzn7nbz3caoxpozztc73e