Open Access   Article Go Back

Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment

Rohit Rai1 , Upasna Singh2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 481-487, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.481487

Online published on Dec 31, 2018

Copyright © Rohit Rai, Upasna Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rohit Rai, Upasna Singh, “Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.481-487, 2018.

MLA Style Citation: Rohit Rai, Upasna Singh "Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment." International Journal of Computer Sciences and Engineering 6.12 (2018): 481-487.

APA Style Citation: Rohit Rai, Upasna Singh, (2018). Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment. International Journal of Computer Sciences and Engineering, 6(12), 481-487.

BibTex Style Citation:
@article{Rai_2018,
author = {Rohit Rai, Upasna Singh},
title = {Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {481-487},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3365},
doi = {https://doi.org/10.26438/ijcse/v6i12.481487}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.481487}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3365
TI - Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Rohit Rai, Upasna Singh
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 481-487
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
269 187 downloads 164 downloads
  
  
           

Abstract

The term ‘group Signature’ is inherited element of ‘digital signature’ that permits any group members to sign the messages on behalf of its group which they belongs too. The identity of original signer is hidden by this resulting signature. Subsequently, the identity of the original signer can be reveal by the group manager, who is only responsible to, open the signatures respectively. The efficient approach that combines the revocation mechanism into group signature schemes based on the robust RSA assumption. The security is an essential factor for a secure group signature scheme, and the third party introduction make the scheme more practical and simple than the previous schemes of this kind.

Key-Words / Index Term

Group signature scheme, Cloud computing, Revocation, RSA Algorithm

References

[1] J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user modification,” in Proc. of IEEE INFOCOM 2014, Toronto, Canada, Apr. 2014, pp. 2121–2129.
[2] B. Wang, L. Baochun, and L. Hui, “Public auditing for shared data with efficient user revocation in the cloud,” in Proc. Of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013, pp. 2904–2912.
[3] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preservingpublic auditing for data storage security in cloud computing,”inProc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp. 525–533.
[4] Pushkar Zagade, Shruti Yadav, Aishwarya Shah, Ravindra Bachate “ Group User Revocation and Integrity Auditing of Shared Data in Cloud Environment” International Journal of Computer Applications (0975 – 8887) Volume 128 – No.12, October 2015.
[5] Subhra Mishra and Tilak Rajan Sahoo” A Survey on Group Signature Schemes” Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela.
[6] Tao Jiang, Xiaofeng Chen, and Jianfeng Ma” Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation” 2015 IEEE.
[7] He Ge “An Effective Method to Implement Group Signature with Revocation”.
[8] Rupeng Li, Jia Yu, Jin Wang,Guowen Li, Daxing Li” Key-Insulated Group Signature Scheme with Verifier-Local Revocation” 2007 IEEE.
[9] Aayush Agarwal, Rekha Saraswat “A Survey of Group Signature Technique, its Applications and Attacks” International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 10, April 2013.
[10] J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 10, pp. 2402–2415, Oct. 2017.
[11] X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure multi-owner data sharing for dynamic groups in the cloud,” IEEE Trans. Parallel Distrib.Syst., vol. 24, no. 6, pp. 1182–1191, Jun. 2013.
[12] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. Conf. Inf. Commun., 2010, pp. 1–9.
[13] T. Jiang, X. Chen and J. Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation," in IEEE Transactions on Computers, vol. 65, no. 8, pp. 2363-2373, 1 Aug. 2016.
[14] Dan Boneh and Hovav Shacham. 2004. Group signatures with verifier-local revocation. In Proceedings of the 11th ACM conference on Computer and communications security (CCS `04). ACM, New York, NY, USA, 168-177.
[15] S. Cui, X. Cheng and C. W. Chan, "Practical group signatures from RSA," 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA`06), Vienna, 2006
[16] R. Li, J. Yu, J. Wang, G. Li and D. Li, "Key-Insulated Group Signature Scheme with Verifier-Local Revocation," Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), Qingdao, 2007
[17] X. Yi, “Identity-based fault-tolerant conference key agreement,” IEEE Trans. Depend. Sec. Comput., vol. 1, no. 3, pp. 170–178, Jul. 2004.
[18] Evgeny Milanov “The RSA Algorithm” published on 3 June 2009
[19] Ako Muhamad Abdullah “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data” 16 June 2017.
[20] Mr. Mangesh Nagarkar , Prof. Patole R.G “Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation” International Journal of Advanced Research in Computer and Communication Engineering. Vol. 5, Issue 11, November 2016.