
Certificateless Integrity Checking of Group Shared Data on Public Distributed Storage
Author(s) -
. Reshma
Publication year - 2022
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2022.41866
Subject(s) - computer science , data deduplication , key escrow , computer security , cloud storage , encryption , cloud computing , public key cryptography , cryptography , public key infrastructure , key exchange , computer network , operating system
Distributed storage administration supplies individuals with an effective strategy to share information inside a gathering. The cloud server isn't reliable, so loads of far-off information ownership checking (RDPC) conventions are proposed and remembered to be a successful method for guaranteeing the information honesty. Notwithstanding, the vast majority of RDPC conventions depend on the system of customary public key framework (PKI), which has clear security defect and bears enormous weight of testament the board. To stay away from this inadequacy, personality-based cryptography (IBC) is many times decided to be the premise of RDPC. Tragically, IBC has an inborn disadvantage of key escrow. To tackle these issues, we use the method of certificateless mark to introduce another RDPC convention for checking the trustworthiness of information divided between a gathering. In this paper, we propose a novel server-side deduplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. This prevents data leakage not only to revoked users even though they previously owned that data, but also to an honest-but-curious cloud storage server. In addition, the proposed scheme guarantees data integrity against any tag inconsistency attack. Thus, security is enhanced in the proposed scheme. The efficiency analysis results demonstrate that the proposed scheme is almost as efficient as the previous schemes, while the additional computational overhead is negligible. Keywords: Cloud, Encryption, de-duplication,