Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/422580
Title: Identity based and certificateless Auditing schemes for cloud Data integrity
Researcher: Mary virgil nithya, S
Guide(s): Rhymend uthariraj, V
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
University: Anna University
Completed Date: 2022
Abstract: Cloud storage is a fundamental component of IT infrastructure for small businesses and enterprises. But the storage can be tampered either intentionally or unintentionally. So, the cloud client uses an auditing scheme called the Provable Data Possession (PDP) scheme to check the integrity of cloud data. The scheme audits the integrity without downloading the data blocks from the storage server. Securing the validity of the PDP scheme has been a challenge. Exposure of the audit key (auditing secret key) especially to the Cloud Service Provider (CSP) is a critical concern since the scheme fails to detect the data damage/loss as the validity of the scheme gets lost. It is also hard to find out if the exposure has already happened. The contributions of this work are within the scope of protecting the validity of the PDP scheme in the context of key-exposure. The existing PDP schemes tackle the key-exposure issue by altering/updating the value of the audit key over time. So, in any time period, a new data block or an updated data block is signed using the audit key of the corresponding period and the signature is called the authentication tag. Majority of these schemes use Public Key Infrastructure (PKI) and so experience the communication cost and the computational complexity of managing/verifying digital certificates. The computational complexity also increases while reviewing the integrity of the data blocks. Few schemes use Identity-Based Cryptography (IBC) and so overcome the overhead linked to certificates. But they protect the efficacy of auditing only in periods past to the period of the exposed key. It means that the risk of key-exposure lasts in future periods and in the period of the exposed key. Moreover, the third party Private Key Generator (PKG) who creates the audit key for the initial time newline
Pagination: certificateless Auditing
URI: http://hdl.handle.net/10603/422580
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.45 kBAdobe PDFView/Open
02_prelim pages.pdf497.44 kBAdobe PDFView/Open
03_content.pdf21.23 kBAdobe PDFView/Open
04_abstract.pdf14.74 kBAdobe PDFView/Open
05_chapter 1.pdf69.19 kBAdobe PDFView/Open
06_chapter 2.pdf157.43 kBAdobe PDFView/Open
07_chapter 3.pdf287.8 kBAdobe PDFView/Open
08_chapter 4.pdf298.94 kBAdobe PDFView/Open
09_chapter 5.pdf230.91 kBAdobe PDFView/Open
10_annexures.pdf298.54 kBAdobe PDFView/Open
80_recommendation.pdf86.83 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: