Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Enhanceduser Revocation for Shared Resource Incloud

R. Ashwini, S. Ishwarya, P.  Saranya

Abstract


Data can be shared and stored in the cloud, user can modify easily and share data as a group. The data integrity can be verified, users in the group need to compute signature on the block in the shared data are signed by different user. For security purpose, after the user is revoked from the group, the blocks which were previously signed by this revoked user must be resigned automatically. In the previous method, user need to download the shared data and re-sign it during user revocation, it is inefficient. It does not support the time performance during the user revocation in the previous method. As a result this mechanism improve the efficiency and time performance during user revocation.


Keywords


Time Performance, Shared Resources, User Revocation, Cloud Computing.

Full Text:

PDF

References


B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” Proc. IEEE INFOCOM,pp. 2904-2912, 2013.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski,G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia,“A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, “Provable Data Possession at Untrusted Stores,”Proc. 14th ACM Conf. Computer and Comm. Security (CCS’07),pp. 598-610, 2007.

H. Shachamby and B. Waters, “Compact Proofs of Retrievability,”Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT’08), pp. 90-107, 2008.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data StorageSecurity in Cloud Computing,” Proc. 17th ACM/IEEE Int’l Workshop Quality of Service (IWQoS’09), pp. 1-9, 2009.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,” Proc. 14th European Conf. Research in Computer Security(ESORICS’09), pp. 355-370, 2009.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc.IEEE INFOCOM, pp. 525-533, 2010.

Y. Zhu, H. Wang, Z. Hu, G.-J.Ahn, H. Hu, and S.S. Yau,“Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds,” Proc. ACM Symp. Applied Computing(SAC’11), pp. 1550-1557, 2011.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards Secure and Dependable Storage Services in Cloud Computing,” IEEE Trans.Services Computing, vol. 5, no. 2, pp. 220-232, Jan. 2012.

Y. Zhu, G.-J.Ahn, H. Hu, S.S. Yau, H.G. An, and C.-J.Hu,“Dynamic Audit Services for Outsourced Storages in Clouds,”IEEE Trans. Services Computing, vol. 6, no. 2, pp. 227-238, Apr.-June 2013.

N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, “LT Codes-BasedSecure and Reliable Cloud Storage Service,” Proc. IEEE INFOCOM, pp. 693-701, 2012.

J. Yuan and S. Yu, “Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud,” Proc. ACM Int’l Workshop Security in Cloud Computing (ASIACCS-SCC’13), pp. 19-26, 2013.

H. Wang, “Proxy Provable Data Possession in Public Clouds,”IEEE Trans. Services Computing, vol. 6, no. 4, pp. 551-559, Oct.-Dec. 2013.

B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” Proc. IEEE CLOUD,pp. 295-302, 2012.

S.R. Tate, R. Vishwanathan, and L. Everhart, “Multi-User Dynamic Proofs of Data Possession Using Trusted Hardware,”Proc. Third ACM Conf. Data and Application Security and Privacy(CODASPY’13), pp. 353-364, 2013.

B. Wang, B. Li, and H. Li, “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud,” Proc. 10th Int’lConf. Applied Cryptography and Network Security (ACNS’12),pp. 507-525, June 2012.

M. Blaze, G. Bleumer, and M. Strauss, “Divertible Protocols and Atomic Proxy Cryptography,” Proc. Int’l Conf. the Theory and Application of Cryptographic Techniques (EUROCRYPT’98), pp. 127-144, 1998.

A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 22, no. 11,pp. 612-613, Nov. 1979.

B. Wang, H. Li, and M. Li, “Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics,” Proc. IEEE Int’l Conf. Comm. (ICC’13), pp. 1946-1950, June 2013.

B. Wang, S.S.M. Chow, M. Li, and H. Li, “Storing Shared Data on the Cloud via Security-Mediator,” Proc. IEEE 33rd Int’lConf. Distributed Computing Systems (ICDCS’13), pp. 124-133,July 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.