Lochar Sowmya, Thalla Shankar


In the cloud of public places, this document focuses on downloading proxy-based data and verifying the integrity of remote data. By using the public cloud platform, customers are freed from the burden of storage management and general access to data with independent geographic locations, and so on. This research is based on the results of the study of proxy coding and encryption of the public key based on the identity and authentication of remote data security in the public cloud. When using public-key cryptography based on identity, the proposed ID-PUIC protocol is effective because the administration of certificates is eliminated. ID-PUIC is a verification of remote data integrity of proxy load and proxy data driven by proxy in the cloud of public places. Throughout the analysis, the administrator will be restricted to connecting to the network in order to protect against collusion. However, the proposed ID-PUIC protocol can also achieve remote verification of data integrity, authorization of remote verification of data integrity and verification of the integrity of remote data in general in accordance with the original authorization of the client. However, the legal work of the Director will continue throughout the analysis process. We provide the official system model and the security model for the ID-PUIC protocol. Then, in line with bilateral couples, we designed the first concrete protocol ID-PUIC. Within the random Oracle model, our secure ID-PUIC protocol is secure.


Proxy Public Key Cryptography; Remote Data Integrity Checking; Cloud Computing; Identity-Based Cryptography; Access Control; Cloud Computing;


E. Zhou and Z. Li, “An improved remote data possession checking protocol in cloud storage,” in Algorithms and Architectures for Parallel Processing (Lecture Notes in Computer Science), vol. 8631. Berlin, Germany: Springer-Verlag, 2014, pp. 611–617.

C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” IEEE Trans. Services Comput., vol. 5, no. 2, pp. 220–232, Apr./Jun. 2012.

P. Xu, H. Chen, D. Zou, and H. Jin, “Fine-grained and heterogeneous proxy re-encryption for secure cloud storage,” Chin. Sci. Bull., vol. 59, no. 32, pp. 4201–4209, 2014.

B. Lynn, “On the implementation of pairing-based cryptosystems,” Ph.D. dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA, 2008.

Efficient public verification proof of retrievability scheme in cloud,” Cluster Comput., vol. 17, no. 4, pp. 1401–1411, 2014.

Huaqun Wang, Debiao He, and Shaohua, “Identity-Based Proxy-Oriented Data Uploading andRemote Data Integrity Checking in Public Cloud”, ieee transactions on information forensics and security, vol. 11, no. 6, june 2016.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.