ICUP: Privacy Preserving Public Auditing Mechanism for Cloud Data
B. Seetharamulu, Dr.G.V. Uma, , ,
Cloud services are used to store and sharing the information, where we can store huge volume of data as well can share among
multiple users. While sharing the data among multiple users privacy of the users and data and also provide data integrity it’s a challenging issue
with the present system. In order address the above issues we proposed ICUP Mechanism which performs public auditing on shared data stored
in the cloud by this first privacy preserving mechanism. For auditing the integrity of shared data it utilizes the ring signature to compute the
verification information. The third party auditor is able to verify the integrity of shared data in the cloud. Hence, this is the mechanism who kept
the identity of signer in shared data private from third party auditor. By utilizing the auditing shared data it demonstrates efficacy and efficiency.
B. Seetharamulu,Dr.G.V. Uma."ICUP: Privacy Preserving Public Auditing Mechanism for Cloud Data". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 06,pp.597-600, DECEMBER - 2014, URL :https://ijcert.org/ems/ijcert_papers/V1I640.pdf,
Keywords : Cloud computing, Public auditing, Privacy-preserving, Shared data, Third Party Auditor.
M. Armbrust , A. Fox, R. Griffith ,A.D.Joseph,R.H.Katz, A.
Konwinski, G.Lee,D. A.Patterson, A.Rabkin, I. Stoica, and
M.Zaharia, ―A View of Cloud Computing,‖ Communication softhe
ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010.
CMConferenceonComputer and Communications Security(CCS),
C.Wang, Q.Wang, K.Ren, andW.Lou,―Privacy-Preserving
Public Auditing for Data Storage Security in Cloud Computing, in
Proc. IEEE International Conference on Computer
Communications (INFOCOM), 2010, pp. 525–533.
 R. L. Rivest, A. Shamir, and Y. Tauman, ―How to Leak a
Secret, in Proc. International Conference on the Theory and
Application of Cryptology and Information
Security(ASIACRYPT).Springer Verlag, 2001, pp. 552–565.
D. Boneh, C. Gentry, B.Lynn, and H.Shacham, ―Aggregate and
Verifiably Encrypted Signatures from Bilinear Maps, in Proc.
International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT).SpringerVerlag,2003,pp.416–432.
 H.Shachamand, B.Waters,―Compact Proofs of Retrievability in
Proc. International Conference on theTheory and Application of
Cryptology and Information Security (ASIACRYPT). Springer
Verlag, 2008, pp. 90–107.
Y.Zhu, H.Wang,Z.Hu, G.-J.Ahn, H.Hu, andS.S.Yau,―Dynamic
Audit Services for Integrity Verification of Outsourced Storage in
Clouds ,in Proc. ACM Symposium on Applied Computing(SAC),
2011, pp. 1550–1557.
 R. Gellman, ―Privacy in the clouds: Risks to privacy and
confidentiality from cloud computing‖, Prepared for the World
Privacy Forum, online at
http://www.worldprivacyforum.org/pdf/WPF Cloud Privacy
Report.pdf, Feb 2009.
 W. Itani, A. Kayssi, A. Chehab, ―Privacy as a Service: PrivacyAware Data Storage and Processing in Cloud Computing
architectures,‖ Eighth IEEE International Conference on
Dependable, Autonomic and SecureComputing, Dec 2009.
 Cloud Security Alliance, ―Security guidance for critical areas of
focus in cloud computing,‖ 2009, online at