Open Access Open Access  Restricted Access Subscription Access

Authentication Authorization and Auditing for Regenerating Encrypted Information in Cloud Computing

Sandeep Dhamal, Mahesh Waghmare, Rohan Patil, Datta Bhujbal, G. S. Mate

Abstract


Abstract
To secure an outsourced data in cloud storage against corruptions and adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Nowadays regenerating codes have been gained popularity due to the lower repair bandwidth while providing error a tolerance. Existing remote checking methods for regenerating-coded data only provide private auditing, requiring data owners to always stay online and handle auditing, as well as repairing which is somewhere unviable. In this system, we propose a public auditing scheme for the regenerating-code-based cloud storage. To solve the regeneration problem of a failed authenticator in the absence of data owners, we introduce a proxy, which is privileged to regenerate the authenticator, into the traditional public auditing system model. Moreover, we design the novel public verifiable authenticator which is generated by couple of keys and can be regenerated using partial keys. Therefore, our scheme can completely release data owners from online burden. Hence we minimize the encode coefficients with a pseudorandom functions to protect data privacy. Extensive security analysis shows that our scheme is provable secure under the oracle model and experimental evaluation indicates that our scheme is highly efficient and can be a feasibly integrated into the regenerating-code-based cloud storage.

Keywords: Cloud storage, regenerating codes, data owner, public audit, privacy preserving, authenticator regeneration, proxy

Cite this Article
Sandeep Dhamal, Mahesh Waghmare, Rohan Patil et al. Authentication authorization and auditing for regenerating encrypted information in cloud computing. Journal of Computer Technology & Applications. 2016; 7(1): 7–11p.


Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Journal of Computer Technology & Applications