Enhanced Public Integrity Auditing On Cloud Data Using Sha Algorithm

##plugins.themes.academic_pro.article.main##

R. Sumathy
P. Kanchanadevi
A.Amuthan

Abstract

Cloud storage growth promotes the secure remote data auditing as a blistering topic. It deals with the problem of security and
efficiency of public data integrity auditing during dynamic data sharing. The existing scheme provides the proficient public
integrity auditing with secure group user communication based on group signature, Asymmetric Group Key Agreement
(ASGKA) and vector commitment. But still this scheme is not consistent for secure group user revocation and also for
dynamic cipher text database. In collusion attack cloud is able to learn the contents of shared data colluding with untrusted or
revoked user. This paper proposes Secure Hash Algorithm-2 (SHA-2) with dynamic user management that supports dynamic
cipher text and efficient user revocation. Secure Hash Algorithm-2 concerns about the intended group communication in that
any member can leave or join the group at any time. It also has a set of cryptographic hash functions that prevents collusion.
Additionally this work wrapped up with the properties, such as confidentiality, efficiency, countability and traceability of
public data integrity auditing.

##plugins.themes.academic_pro.article.details##

How to Cite
R. Sumathy, P. Kanchanadevi, & A.Amuthan. (2022). Enhanced Public Integrity Auditing On Cloud Data Using Sha Algorithm. IIRJET, 2(Special Issue ICEIET). Retrieved from https://iirjet.org/index.php/home/article/view/196