E. Soundarya, K.S.R.K. Sarma


In community places swarm, the thing indicated card follow the identity-based executor-oriented measurements uploading and far flung proof soundness checking. Using the urban mist terrace, the shoppers are excuse the weight for repertory control, total testimony gets right of entry to by self sustaining geographic locations, etc. This vellum be dependent on the find out about outcomes of representative Morse alphabet, identity-based everyone key Morse alphabet and far off reports entireness checking in national places muddy. By utilizing identity-based communal key cryptology, our hinted ID-PUIC compact is skillful since the sheepskin control is eliminated. ID-PUIC is mostly a recent alternate-oriented statistics uploading and far flung proof rectitude checking configuration in national places muddy. Throughout reasoning, the chief will be limiting oneself to connect with the wiring so as to uphold dodge. However, the hinted ID-PUIC treaty could also know deepest far flung testimony totality checking, delegated far off input honesty checking and society far off evidence absoluteness checking in step with the unusual client’s say so. But, the executive’s legitimate institution desire comport all the way through reasoning. We give you the strict artifice ideal and redemption mode for ID-PUIC order. Then, according to the bilinear intercourse, we designed the first actual dried ID-PUIC covenant. Within the aimless fortune style, our designed ID-PUIC agreement is provably secure.


Proxy Public Key Cryptography; Remote Data Integrity Checking; Cloud Computing; Identity-Based Cryptography;


B. Lynn, “On the implementation of pairing-based cryptosystems,” Ph.D. dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA, 2008.

E. Zhou and Z. Li, “An improved remote data possession checking protocol in cloud storage,” in Algorithms and Architectures for Parallel Processing (Lecture Notes in Computer Science), vol. 8631. Berlin, Germany: Springer-Verlag, 2014, pp. 611–617.

J. Zhang, W. Tang, and J. Mao, “Efficient public verification proof of retrievability scheme in cloud,” Cluster Comput., vol. 17, no. 4, pp. 1401–1411, 2014.

P. Xu, H. Chen, D. Zou, and H. Jin, “Fine-grained and heterogeneous proxy re-encryption for secure cloud storage,” Chin. Sci. Bull., vol. 59, no. 32, pp. 4201–4209, 2014.

C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” IEEE Trans. Services Comput., vol. 5, no. 2, pp. 220–232, Apr./Jun. 2012.

Huaqun Wang, Debiao He, and Shaohua, “Identity-Based Proxy-Oriented Data Uploading andRemote Data Integrity Checking in Public Cloud”, ieee transactions on information forensics and security, vol. 11, no. 6, june 2016.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at