Prudhvi Raju Manthena, A. Sangeetha


This paper is dependent on the study outcomes of proxy cryptography, identity-based public key cryptography and remote data integrity checking in public places cloud. In public places cloud, this paper concentrates on the identity-based proxy-oriented data uploading and remote data integrity checking. By utilizing identity-based public key cryptology, our suggested ID-PUIC protocol is efficient because the certificate management is eliminated. ID-PUIC is really a novel proxy-oriented data uploading and remote data integrity checking model in public places cloud. Using the public cloud platform, the customers are relieved from the burden for storage management, universal data access with independent geographical locations, etc. Throughout analysis, the manager is going to be limited to connect to the network to be able to guard against collusion. But, the manager’s legal business will go on throughout analysis. We provide the formal system model and security model for ID-PUIC protocol. Then, in line with the bilinear pairings, we designed the very first concrete ID-PUIC protocol. Within the random oracle model, our designed ID-PUIC protocol is provably secure. However, the suggested ID-PUIC protocol may also realize private remote data integrity checking, delegated remote data integrity checking and public remote data integrity checking in line with the original client’s authorization.


Proxy Public Key Cryptography; Remote Data Integrity Checking; Cloud Computing; Identity-Based Cryptography;


X. Liu, J. Ma, J. Xiong, T. Zhang, and Q. Li, “Personal health records integrity verification using attribute based proxy signature in cloud computing,” in Internet and Distributed Computing Systems (Lecture Notes in Computer Science), vol. 8223. Berlin, Germany: SpringerVerlag, 2013, pp. 238–251.

H. Guo, Z. Zhang, and J. Zhang, “Proxy re-encryption with unforgeable re-encryption keys,” in Cryptology and Network Security (Lecture Notes in Computer Science), vol. 8813. Berlin, Germany: Springer-Verlag, 2014, pp. 20–33.

E. Esiner, A. Küpçü, and Ö. Özkasap, “Analysis and optimization on FlexDPDP: A practical solution for dynamic provable data possession,” Intelligent Cloud Computing (Lecture Notes in Computer Science), vol. 8993. Berlin, Germany: Springer-Verlag, 2014, pp. 65–83.

E. Zhou and Z. Li, “An improved remote data possession checking protocol in cloud storage,” in Algorithms and Architectures for Parallel Processing (Lecture Notes in Computer Science), vol. 8631. Berlin, Germany: Springer-Verlag, 2014, pp. 611–617.

J. Zhang, W. Tang, and J. Mao, “Efficient public verification proof of retrievability scheme in cloud,” Cluster Comput., vol. 17, no. 4, pp. 1401–1411, 2014.

J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” J. Internet Technol., vol. 16, no. 1, pp. 171–178, 2015.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at