云共享数据公共审计的同态可认证环签名机制

G. D. Patwardhan, B. W. Balkhande
{"title":"云共享数据公共审计的同态可认证环签名机制","authors":"G. D. Patwardhan, B. W. Balkhande","doi":"10.18535/ijecs/v5i3.10","DOIUrl":null,"url":null,"abstract":": Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. Specifically, our contribution in this work can be summarized as the following three aspects: the best of our knowledge, our is the to support scalable and Cloud Computing. In particular, our scheme achieves batch auditing multiple delegated auditing tasks from different users can be performed simultaneously by the TPA.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"3 1","pages":"20-26"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Homomorphic Authenticable Ring Signature Mechanism for Public Auditing on Shared Data in the Cloud\",\"authors\":\"G. D. Patwardhan, B. W. Balkhande\",\"doi\":\"10.18535/ijecs/v5i3.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. Specifically, our contribution in this work can be summarized as the following three aspects: the best of our knowledge, our is the to support scalable and Cloud Computing. In particular, our scheme achieves batch auditing multiple delegated auditing tasks from different users can be performed simultaneously by the TPA.\",\"PeriodicalId\":13846,\"journal\":{\"name\":\"International Journal for Scientific Research and Development\",\"volume\":\"3 1\",\"pages\":\"20-26\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal for Scientific Research and Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18535/ijecs/v5i3.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal for Scientific Research and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18535/ijecs/v5i3.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

云计算是将计算作为一种实用工具的长期梦想,用户可以将其数据远程存储到云中,以便从共享的可配置计算资源池中享受按需高质量的应用程序和服务。通过数据外包,可以减轻用户在本地存储和维护数据的负担。因此,启用云数据存储安全的公共可审计性至关重要,这样用户就可以在需要时求助于外部审计方来检查外包数据的完整性。为了安全地引入一个有效的第三方审计员(TPA),必须满足以下两个基本要求:1)TPA应该能够有效地审计云数据存储,而不需要数据的本地副本,并且不会给云用户带来额外的在线负担。具体来说,我们在这项工作中的贡献可以概括为以下三个方面:我们的知识,我们的是支持可扩展和云计算。特别是,我们的方案实现了批量审计,多个来自不同用户的委托审计任务可以由TPA同时执行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Homomorphic Authenticable Ring Signature Mechanism for Public Auditing on Shared Data in the Cloud
: Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. Specifically, our contribution in this work can be summarized as the following three aspects: the best of our knowledge, our is the to support scalable and Cloud Computing. In particular, our scheme achieves batch auditing multiple delegated auditing tasks from different users can be performed simultaneously by the TPA.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Twenty-First Century Skills and Their Relationship to The Quality of Psychological Life Among a Sample of Students at King Abdulaziz University in Jeddah Computerizing The Security of Ambiguity in Morphological Semantics The Difference in the Synonymous Meanings of the Holy Quran Between the Inhibitors and the Gallant Advancements in Optical Technologies for Medical Imaging and Diagnosis Fugitive Identity in London’s Victoria Station When Khalid Amine Frames the Road to Seniority Through a Cross-cultural Performance
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1