Loading

Auditing the Shared Data on Cloud using Ring Signatures
C. Thilagavathi1,  A. Selvi2

1Mrs. C. Thilagavathi, Assistant Professor, Department of IT, M. Kumarasamy College of Engineering, Karur (Tamil Nadu), India.
2Mrs. A. Selvi, Assistant Professor, Department of IT, M. Kumarasamy College of Engineering, Karur (Tamil Nadu), India.
Manuscript received on 22 May 2019 | Revised Manuscript received on 08 June 2019 | Manuscript Published on 15 June 2019 | PP: 365-368 | Volume-8 Issue-1S2 May 2019 | Retrieval Number: A00850581S219/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Using the information organization of cloud computing, the information isn’t simply saved, anyway it is flowed by and large among different clients. Forbiddingly the undaunted idea of data is anchored in cloud faces preposterous issues in light of the particular issues and flighty bungles. Different techniques are sufficiently utilized to examining cloud data security without getting to the whole data from the server. The security of such data isn’t guarded amidst open minding. The proposed system recommends an insurance defending method that empowers a cloud to store data securely. It controls ring imprints to assess attestation meta-data required to ensure the rightness. The system ensures the insurance of scattered information without getting to the entire record. The methodology enables security for a couple of exercises in the meantime. The reenactment work traces viability and furthermore accommodation of scattered information unflinching quality.
Keywords: Cloud Data Auditing Information Computing.
Scope of the Article: Cloud Computing