IDENTITY BASED REMOTE DATA INTEGRITY

Authors

  • Pooja More Student, Department of Information Technology, Dr. DY Patil College of engineering Akurdi. Maharashtra, India
  • Sneha Jalkote Student, Department of Information Technology, Dr. DY Patil College of engineering Akurdi. Maharashtra, India
  • Shraddha Biradar Student, Department of Information Technology, Dr. DY Patil College of engineering Akurdi. Maharashtra, India
  • Shridevi Kale Student, Department of Information Technology, Dr. DY Patil College of engineering Akurdi. Maharashtra, India
  • Prof. Ashwini Abhale Assistant Professor, Department of Information Technology, Dr. DY Patil College of engineering Akurdi. Maharashtra, India

Keywords:

Integrity Verification, Security Scheme, Cloud computing, Group signature, Dynamic data, Public integrity auditing, vector commitment

Abstract

Remote information integrity checking (RDIC) allows a knowledge storage server, say a cloud server, to
sway a voucher that it's truly storing an information owner’s data honestly. To date, variety of RDIC protocols are
planned within the literature, however most of the constructions suffer from the difficulty of a posh key management,
that is, they have confidence the high-priced public key infrastructure (PKI), which could hinder the readying of
RDIC in follow. During this paper, we have a tendency to propose a replacement construction of identity-based (IDbased) RDIC protocol by creating use of key-homomorphic cryptological primitive to scale back the system
complexness and also the price for establishing and managing the general public key authentication framework in
PKI based mostly RDIC schemes. We have a tendency to formalize ID-based RDIC and its security model together
with security against a malicious cloud server and nil information privacy against a 3rd party voucher. The planned
ID-based RDIC protocol leaks no data of the keep information to the voucher throughout the RDIC method. The new
construction is tried secure against the malicious server within the generic cluster model and achieves zero
information privacy against a voucher. Intensive security analysis and implementation results demonstrate that the
planned protocol is demonstrably secure and sensible within the real-world applications. We have a tendency to
Extend This work with cluster Management with Forward Secrecy & Backward Secrecy by Time period & Recovery
of File once information Integrity Checking Fault Occur.

Published

2018-05-25

How to Cite

Pooja More, Sneha Jalkote, Shraddha Biradar, Shridevi Kale, & Prof. Ashwini Abhale. (2018). IDENTITY BASED REMOTE DATA INTEGRITY. International Journal of Advance Research in Engineering, Science & Technology, 5(5), 145–151. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1696