Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

0
471
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Abstract

With the rapid development of cloud computing, more and more clients want to store their data on public cloud servers (PCSs). Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud On the other hand, remote data integrity checking in public cloud storage is also an important security issue. We propose a new Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography from security issues: identity-based proxy-oriented data uploading and remote data integrity checking in the public cloud (ID-PUIC). We provide the formal definition, model of the system, and model of security.
 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud The proposed ID-PUIC protocol can perform private remote data integrity checking, delegated remote data integrity checking, and public remote data integrity checking based on the authorization of the original client.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
 
RAM                      : 256 MB(min)
 
Hard Disk              : 20 GB
 
Floppy Drive          : 1.44 MB
 
Key Board             : Standard Windows Keyboard
 
Mouse                  : Two or Three Button Mouse
 
Monitor                : SVGA
 
S/W System Configuration
 
 
Platform                     :  cloud computing

 
Operating system       : Windows Xp,7,
 
Server                       : WAMP/Apache
 
Working on                : Browser Like Firefox, IE

Conclusion

Motivated by the application needs, this paper proposes ID-PUIC’s novel security concept in the public cloud. The paper formalizes the system model and security model of ID-PUIC. Then, using the technique of bilinear pairings, the first concrete ID-PUIC protocol is designed. By using the formal security proof and efficiency analysis, the concrete ID-PUIC protocol is proven secure and efficient.