Public Auditing for Shared Data in Cloud Storage with an Effective User Dismissal

  • S. SamundiswaryEmail author
  • Nilima Dongre
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 810)


Cloud computing is an extensive technique which is changing the IT infrastructure swiftly. Data storage and sharing is the foremost and significant research area in cloud computing. Major security issues in cloud storage include missing folders, privacy settings, synchronization issues, etc. One of the topmost exigent research issues in data storage is data integrity. This research study identifies the security issue in data storage and achieves data integrity and privacy by providing public auditing using third-party auditor. To attain an effective key sharing, Shamir’s secret sharing technique is exploited. The proposed system supports an efficient user dismissal by group admin in case if any user is found troublesome while sharing data in cloud storage. To provide a beneficial auditing for users, batch auditing is additionally presented to reduce the auditing time.


TPA Cloud service provider Proxy re-signature Shamir’s secret-sharing scheme 


  1. 1.
  2. 2.
    Wang, C., Chow, S.S.M.: Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2) (2013)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Li, J., Zhang, L.: Privacy preserving public auditing protocol for low performance end devices in cloud. IEEE Trans. Inf. Forensic Secur. (2016)Google Scholar
  4. 4.
    Wang, B., Li, H.: Oruta: privacy preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. (2014)Google Scholar
  5. 5.
    Wang, B., Li, H.: Privacy preserving public auditing for shared cloud data supporting group dynamics. IEEE Trans. Cloud Comput. (2014)Google Scholar
  6. 6.
    He, K., Shi, C.H.J.: Identity preserving public auditing for shared cloud data. In: IEEE 23rd IWQOS (2015)Google Scholar
  7. 7.
    Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi user modification. In: IEEE INFOCOM (2014)Google Scholar
  8. 8.
    Jiang, T., Ma, J.: Public integrity auditing for shared dynamic cloud data with user revocation. IEEE Trans. Comput. (2015)Google Scholar
  9. 9.
    Ateniese, G.: Proxy resignature: new definitions, algorithms and applications. Springer J.Google Scholar
  10. 10.
    Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. (2012)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Information TechnologyRamrao Adik InstituteNerulIndia

Personalised recommendations