An Effective Fog-Enabled E-Health with Hierarchical Attribute Revocation using Cloud Computing
P.B. Kamale Sree
Keywords: Cloud Based Data Extraction Concept, User Revocation, Cloud Computing.
Cloud users can verify the integrity of data without having to retrieve the entire file using Provable Data Possession (PDP). All of the current PDP schemes are based on the Public Key Infrastructure (PKI). The scheme is efficient, flexible, and it supports private verification, delegated verification, and public verification. Because it fails to achieve soundness, ID-DPDP is flawed. Present a generic construction to correct the flaw. By extending the fundamental ID-PDP to multiple cloud environments, a new ID-DPDP protocol is created.
Users can easily modify and share data in groups with cloud-based data storage and sharing services. Users in the group are required to compute signatures on all shared data blocks in order to guarantee that the integrity of the data can be verified publicly. Due to data modifications made by different users, different blocks in shared data are typically signed by different users. Once a user is removed from the group for security reasons, the blocks that were signed by that user must be resigned by an existing user. Due to the large size of shared data in the cloud, the straightforward method, which allows an existing user to download the relevant portion of shared data and re-sign it during user revocation, is inefficient.