首页    期刊浏览 2024年09月19日 星期四
登录注册

文章基本信息

  • 标题:A Review on Identity-Based Proxy-Oriented Data Uploading and Inaccessible Data Integrity Inspection in Public Cloud
  • 本地全文:下载
  • 作者:IJCT K. Ravikumar ; I. Renuka
  • 期刊名称:International Journal of Computer Techniques
  • 电子版ISSN:2394-2231
  • 出版年度:2017
  • 卷号:4
  • 期号:5
  • 页码:6-9
  • 语种:English
  • 出版社:International Research Group - IRG
  • 摘要:More clients might want to store their information to PCS (public cloud servers) along with the rapid improvement of cloud computing. Cloud computing is changing into progressively popular. An outsized range of information square measure outsourced to the cloud by data homeowners actuated to access the large-scale computing resources and economic savings. The existing remote data possession checking (RDPC) protocols have been designed in the PKI (public key infrastructure) setting. The cloud server has to validate the users’ certificates before storing the data uploaded by the users in order to prevent spam. When the client is controlled to admittance PCS, he determination representative its proxy to procedure his information and uploaded them in many files. On the additional pointer, inaccessible information examination is also an significant safety problematic in public cloud storage. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and security model. Cloud computing is the new range in wireless world. One of the major challenging issues is data integrity/security. For achieving the efficiency of cloud storage, the proposed system provides flexible data segmentation with additional authorization process among the three participating parties of client, server and a third-party auditor (TPA). We propose an identity based data storage scheme, it will resist the collusion attacks
国家哲学社会科学文献中心版权所有