CFP last date
20 January 2025
Reseach Article

A Novel Approach for an Enhanced Oruta with Data Freshness

by Ridham Kapadiya, Jignesh Prajapati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 10
Year of Publication: 2015
Authors: Ridham Kapadiya, Jignesh Prajapati
10.5120/ijca2015907047

Ridham Kapadiya, Jignesh Prajapati . A Novel Approach for an Enhanced Oruta with Data Freshness. International Journal of Computer Applications. 130, 10 ( November 2015), 1-3. DOI=10.5120/ijca2015907047

@article{ 10.5120/ijca2015907047,
author = { Ridham Kapadiya, Jignesh Prajapati },
title = { A Novel Approach for an Enhanced Oruta with Data Freshness },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 10 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number10/23242-2015907047/ },
doi = { 10.5120/ijca2015907047 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:59.193539+05:30
%A Ridham Kapadiya
%A Jignesh Prajapati
%T A Novel Approach for an Enhanced Oruta with Data Freshness
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 10
%P 1-3
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has become an emerging service because of the ease of its use. Its vast usage has raised some serious issues. When cloud has become a large storage for the data, the security and integrity have become most serious issues. Users must be concerning with the data stored remotely. Many auditing schemes have been introduced for public auditing which audits data without downloading the whole data. Among them, Oruta is privacy preserving public auditing scheme which uses ring signature that audits data with identity privacy. But Oruta lacks with data freshness, batch auditing and traceability. We have introduced an enhanced scheme which enables data freshness within Oruta. Data freshness is to update data with the latest one.

References
  1. B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” Proc. IEEE Fifth Int’l Conf. Cloud Computing, pp. 295-302, 2012.
  2. B. Wang, B. Li, and H. Li, “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud,” Proc. 10th Int’l Conf. Applied Cryptography and Network Security (ACNS’12),pp. 507-525, June 2012.
  3. P. Maheswari, B. Sindhumathi, " AFS: Privacy-Preserving Public Auditing With Data Freshness in the Cloud ", IOSR
  4. Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727 PP 56-63C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, pp. 525-533, 2010.
  5. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-610, 2007.
  6. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008.
  7. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,“Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS’09), pp. 213-222, 2009.
  8. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,” Proc. 14th European Conf. Research in Computer Security (ESORICS’09), pp. 355-370, 2009.
  9. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS’09), pp. 1-9, 2009.
  10. B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote Data Checking for Network Coding-Based Distributed Storage Systems,”Proc. ACM Workshop Cloud Computing Security Workshop (CCSW’10), pp. 31-42, 2010.
  11. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S Yau,“Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds,” Proc. ACM Symp. Applied Computing (SAC’11), pp. 1550-1557, 2011.
  12. N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, “LT Codes-Based Secure and Reliable Cloud Storage Service,” Proc. IEEE INFOCOM,2012.
  13. B. Wang, B. Li, and H. Li, “Certificateless Public Auditing for Data Integrity in the Cloud,” Proc. IEEE Conf. Comm. and Network Security (CNS’13), pp. 276-284, 2013.
  14. Ridham Kapadiya, Jignesh Prajapati, "A survey of privacy preserving public auditing techniques for shared data in cloud computing", Proc. IJCA , issue 14, vol 110,2015.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Shared Data public auditing identity privacy Data Freshness