|بخشی از ترجمه فارسی مقاله:
|بخشی از مقاله انگلیسی:
Cloud computing can be defined as a network based computing which provides shared processing data & resources to its user when required. As per NIST, it is a model which enables pervasive, on-demand access to resources being shared that can be rapidly provisioned & released with minimum management effort . It provides a user various capabilities for storing their data at the cloud server & processing it when required. This motivates organizations to outsource their data to an external storage server & improve the storage constraints of local devices, and enables them g researched nowadays. It provides various services to its users. Among them, one of the salient service offered is cloud storage which makes data outsourcing a rising trend. But the major concern associated is the integrity and seclusion of outsourced data. Users require their data to be secure from any modification or unauthorized access. Therefore someway to verify whether the data is intact or not, without retrieving, should exist. This boosts the need of secure remote data auditing. This paper proposes an auditing scheme based on vector commitment, identity based ring signature and group key agreement protocol, emanated on bilinear pairing. An experimental analysis of the proposed scheme, later in the end, shows that when compared with its pertinent schemes, the proposed scheme is also efficient. to have more focus on their core competencies. Cloud user can access the data anytime, when required, from any part of the world but in some cases like hardware failure etc. the server may return an invalid result. Thus data integrity becomes the biggest concern for the cloud users as they no longer have a physical control over their outsourced data. Therefore to assure whether the data is secure or not, a way to verify its integrity and accessibility must exist for the users. Some solutions have been put forward for assuring the integrity & availability of data stored at a faraway server. Authors in the references , , , , , ,  and  proposes dynamic scheme which focuses on instances where only the owner can modify the stored data. Applications ,  and , where cloud assistance is used as a cooperation platform, multiple group users shares the code and can access, revise and run it anytime anywhere. Such type of collaborative network makes remote auditing schemes impracticable where only the data owner can modify the data. It will cause a lot of computation and communication overhead to data owner and are inappropriate for him. If integrity verification can be done by person other than data owner, that is, by third party auditor, then the scheme is publicly verifiable. The scheme in  designs polynomial authentication tags and uses proxy tag update technique to support public auditing but the data confidentiality of group users is not considered. This means that the scheme supports data update & integrity checking for plaintext, not for cipher text. Yet no solution addresses the issue of public integrity checking with group user modification. The dearth of these schemes prompts us to propose a reliable as well as an efficient way for remote data auditing. To the end, a construction is proposed which applies vector commitment over the database and supports group data encryption & decryption during its modification using group key agreement protocol . Identity based ring signatures  are used to protect the anonymity of the signer.