Combined Data User-side and Cloud-Side Access Control for Encrypted Cloud Storing
Main Article Content
Abstract
Remote data integrity checking (RDIC) enables a data storehouse say a pall garçon, to prove to a verifier that it's actually storing a data proprietor’s data actually. To date, a number of RDIC protocols have been proposed in the literature, but utmost of the constructions suffer from the issue of a complex crucial operation, that is, they calculate on the precious public key structure (PKI), which might hamper the deployment of RDIC in practice. In this paper, we propose a new construction of identity- grounded (ID- grounded) RDIC protocol by making use of crucial-homomorphic cryptographic primitive to reduce the system complexity and the cost for establishing and managing the public key authentication frame in PKI grounded RDIC schemes. We formalize ID- grounded RDIC and its security model including security against a vicious pall and zero knowledge sequestration against a third- party verifier. The proposed ID- grounded RDIC protocol leaks no information of the stored data to the verifier during the RDIC process. The new construction is proven secure against the vicious in the general group model and achieves zero knowledge sequestration against a verifier. Expansive security analysis and perpetration results demonstrate that the proposed protocol is provably secure and practical in the real- world operations. We Extend This work with Group Management with Forward Secrecy & Backward Secrecy by Time Duration & Recovery of Train when Data Integrity Checking Fault Occur