2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2015
DOI: 10.1109/iciiecs.2015.7192897
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preservation and public auditing for cloud data using ASS in Multi-cloud

Abstract: Cloud computing is the new business paradigm introduced in the IT market in the current decade providing the customers with the option to pay for the amount of service utilized. The use of cloud computing has increased rapidly in many organizations.Ensuring security of data in a cloud is a major factor in the cloud computing environment, as users often store fragile information in cloud storage. Public auditing on shared data stored in the cloud is done by exploiting Aggregate Signature Scheme. With this mecha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…If the client is not legitimate he/she can't get the record since the haphazardly produced key is basic for the document. [8] Xia et al, (2016) followed tree-based index structure. They also proposed a "Greedy Depth-first Search" algorithm for providing effective multi-keyword ranked search.…”
Section: Literature Surveymentioning
confidence: 99%
“…If the client is not legitimate he/she can't get the record since the haphazardly produced key is basic for the document. [8] Xia et al, (2016) followed tree-based index structure. They also proposed a "Greedy Depth-first Search" algorithm for providing effective multi-keyword ranked search.…”
Section: Literature Surveymentioning
confidence: 99%
“…Nowadays, cloud computing is one among the hot topics in both industry and academic research [3] like storage, security, load balancing, task assignment, etc. Secure data access and maintaining the confidentiality of data stored in a cloud are the most important research areas in cloud computing.…”
Section: Introductionmentioning
confidence: 99%
“…When an owner of data partions their data and sign them and distribute them to multi-clouds and share them with others, the third party could get the identity of the signer since it is needed when auditing. Therefore, they proposed this solution to prevent violating the privacy of the owner by knowing their identity by using creating homomorphic authenticators by using aggregate signatures [73]. Aggregate signature scheme is a group of signatures that are aggregated to one digital signature [74].…”
Section: Multi-cloud Computing (Mmc) Issuesmentioning
confidence: 99%
“…In [73], SUGANTHI et al proposed a solution for protecting the privacy of the signer of that data from a third party auditor while auditing process. When an owner of data partions their data and sign them and distribute them to multi-clouds and share them with others, the third party could get the identity of the signer since it is needed when auditing.…”
Section: Multi-cloud Computing (Mmc) Issuesmentioning
confidence: 99%