Special Issue - NCRTCC - 16- 2016

  • 1. Concealment perpetuate common auditing for halvered documents in the storage

    Authors : R. Rajalakshmi, R. Murugan

    Pages : 29-31

    Keywords : web

    Abstract :

    Web storage services, it is common place for documents to be not only stored in the storage place, but also halvered beyond diverse users. However, common auditing for such halvered data while perpetuate identity privacy remains to be an open challenge. We introduce the first concealment perpetuate mechanism that allows common auditing on halvered data stored in the storage place. In particular, we exploit key to compute the verification information needed to audit the integrity of halvered data. With our mechanism, the identity of the signer on each block in halvered data is kept private from a auditor, who is still able to verify the integrity of halvered data without retrieving the entire file. Our experimental results demonstrate the effectiveness and efficiency of our developed mechanism when auditing halvered data.

    Citing this Journal Article :

    R. Rajalakshmi, R. Murugan, "Concealment perpetuate common auditing for halvered documents in the storage", https://www.ijltet.org/journal_details.php?id=902&j_id=3138, Special Issue - NCRTCC - 16- 2016, 29-31, #ijltetorg