Main Reference PaperPanda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud, IEEE Transactions on Services Computing, 2015.
  • The shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. The new public auditing mechanism for shared data with efficient user revocation in the cloud is proposed. When a user in the group is revoked, the semi-trusted cloud is allowed to re-sign blocks that were signed by the revoked user with proxy re-signatures.

+ Description
  • The shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. The new public auditing mechanism for shared data with efficient user revocation in the cloud is proposed. When a user in the group is revoked, the semi-trusted cloud is allowed to re-sign blocks that were signed by the revoked user with proxy re-signatures.

  • To improve the efficiency of user revocation in the cloud and existing users in the group can save a significant amount of computation and communication resources during user revocation.

  • To provide provably secure and highly efficient scheme.

+ Aim & Objectives
  • To improve the efficiency of user revocation in the cloud and existing users in the group can save a significant amount of computation and communication resources during user revocation.

  • To provide provably secure and highly efficient scheme.

  • The collusion-resistant proxy re-signature schemes generally have two levels of signatures, are in different forms and need to be verified differently, achieving blockless verifiability on both of the two levels of signatures and verifying them together in a public auditing mechanism is contributed.

+ Contribution
  • The collusion-resistant proxy re-signature schemes generally have two levels of signatures, are in different forms and need to be verified differently, achieving blockless verifiability on both of the two levels of signatures and verifying them together in a public auditing mechanism is contributed.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1 and J2SE, Cloudsim 3.0.3

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1 and J2SE, Cloudsim 3.0.3

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

  • 10 – 15 Days

+ Order To Delivery
  • 10 – 15 Days

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.