1 research outputs found

    A RELIABLE DATA OUTSOURCING WITH REVOCABLE REPOSITORY IDENTITY-BASED CONVERSION IN CLOUD COMPUTING

    Get PDF
    In the cloud of public places, this document focuses on downloading proxy-based data and verifying the integrity of remote data. By using the public cloud platform, customers are freed from the burden of storage management and general access to data with independent geographic locations, and so on. This research is based on the results of the study of proxy coding and encryption of the public key based on the identity and authentication of remote data security in the public cloud. When using public-key cryptography based on identity, the proposed ID-PUIC protocol is effective because the administration of certificates is eliminated. ID-PUIC is a verification of remote data integrity of proxy load and proxy data driven by proxy in the cloud of public places. Throughout the analysis, the administrator will be restricted to connecting to the network in order to protect against collusion. However, the proposed ID-PUIC protocol can also achieve remote verification of data integrity, authorization of remote verification of data integrity and verification of the integrity of remote data in general in accordance with the original authorization of the client. However, the legal work of the Director will continue throughout the analysis process. We provide the official system model and the security model for the ID-PUIC protocol. Then, in line with bilateral couples, we designed the first concrete protocol ID-PUIC. Within the random Oracle model, our secure ID-PUIC protocol is secure
    corecore