Cloud Computing Projects

Abstract:

Cloud users can use a TPA to verify data integrity with public verification. However, quantum computer breakthroughs suggest cloud applications. Most public verification schemes use conventional hardness assumptions, which are vulnerable to future quantum computer adversaries.

When an original data owner cannot access the remote cloud server freely, new security issues must be addressed. This paper proposes efficient identity-based data outsourcing with public integrity verification (DOPIV) in cloud storage.

Lattice-based cryptography secures DOPIV post-quantum. DOPIV lets a data owner delegate a proxy to generate signatures and outsource them to the cloud server. Without retrieving the entire data set, any TPA can efficiently verify data integrity for the data owner.

Identity-based DOPIV systems avoid complex certificate management. DOPIV is more practical in post-quantum secure cloud storage systems after security proofs in the random oracle model and a comprehensive performance evaluation.

Note: Please discuss with our team before submitting this abstract to the college. This Abstract or Synopsis varies based on student project requirements.

Did you like this final year project?

To download this project Code with thesis report and project training... Click Here

You may also like: