Main Reference PaperEnabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data, IEEE Transactions on Dependable and Secure Computing, 2018[Java].
  • It proposes a novel storage auditing scheme that achieves highly-efficient user revocation independent of the total number of file blocks possessed by the revoked user in the cloud. This is achieved by exploring a novel strategy for key generation and a new private key update technique. Using this strategy and the technique, we realize user revocation by just updating the non-revoked group users’ private keys rather than authenticators of the revoked user. The integrity auditing of the revoked user’s data can still be correctly performed when the authenticators are not updated. The proposed scheme is based on identity-base cryptography, which eliminates the complicated certificate management in traditional Public Key Infrastructure systems. The security and efficiency of the proposed scheme are validated via both analysis and experimental results.

Description
  • It proposes a novel storage auditing scheme that achieves highly-efficient user revocation independent of the total number of file blocks possessed by the revoked user in the cloud. This is achieved by exploring a novel strategy for key generation and a new private key update technique. Using this strategy and the technique, we realize user revocation by just updating the non-revoked group users’ private keys rather than authenticators of the revoked user. The integrity auditing of the revoked user’s data can still be correctly performed when the authenticators are not updated. The proposed scheme is based on identity-base cryptography, which eliminates the complicated certificate management in traditional Public Key Infrastructure systems. The security and efficiency of the proposed scheme are validated via both analysis and experimental results.

  • To reduce the computational overhead caused by user revocations in cloud data auditing.

  • To validate the security and efficiency of the storage auditing scheme.

Aim & Objectives
  • To reduce the computational overhead caused by user revocations in cloud data auditing.

  • To validate the security and efficiency of the storage auditing scheme.

  • The cloud verification of validity of the file tag and authenticators is considered.

Contribution
  • The cloud verification of validity of the file tag and authenticators is considered.

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit