Efficient User Revocation in Identity-based Data Sharing On Cloud
Keywords:
Cloud computing; cloud storage auditing; user revocation; big data; identity-based cryptographyAbstract
Cloud storage auditing schemes for shared information see checking the integrity of cloud
information shared by a group of users. User revocation is commonly supported in such schemes, as
users is also subject to group membership changes for varied reasons. Previously, the machine
overhead for user revocation in such schemes is linear with the total range of file blocks possessed
by a revoked user. The overhead, however, would possibly become a big burden thanks to the sheer
amount of the shared cloud information. Thus, the thanks to cut back the machine overhead caused
by user revocations becomes a key analysis challenge for achieving sensible cloud information
auditing. throughout this paper, we tend to propose a novel storage auditing theme that achieves
highly-efficient user revocation freelance of the total vary of file blocks possessed by the revoked
user at intervals the cloud. typically|this can be} often achieved by exploring a novel strategy for key
generation and a replacement personal key update technique. mistreatment this strategy and
additionally the technique, we tend to comprehend user revocation by simply change the non revoked
group users’ private keys rather than authenticators of the revoked user. The integrity auditing of the
revoked user’s information can still be properly performed once the authenticators aren't updated.
Meanwhile, the planned theme is predicated on identity-base cryptography, that eliminates the
sophisticated certificate management in ancient Public Key Infrastructure (PKI) systems. the safety
and potency of the projected theme are valid via every analysis and experimental results.