A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)Publication Date: 2015-11-05
Authors : Sneha Singha; S. D. Satav;
Page : 1821-1823
Keywords : Data storage; cloud storage auditing; de-duplication; cloud computation; key-exposure resistance; tile bitmap;
Abstract
As data is dynamically updated in todays world, the existing remote integrity checking methods which served as a purpose for static data can no longer be enforced to authenticate the integrity of dynamic data in the cloud. In this scenario, cloud storage auditing conveys an efficient and secure dynamic auditing protocol which draws a confidence to the data owners that their data is correctly stored in the cloud. The present auditing protocols assume that the secret key of the client is very secure while in reality, it is not. Thus, to overcome these flaws, this paper introduces an idea of lessening the clients secret key disclosure. In this paper, we propose a system where de-duplication strategy of data is adopted and it will check the duplicacy of data and eliminate the redundant one using MD5 hashing. Also, it uses tile bitmap method wherin it will check the previous and the current versions of the data to ease the auditors workload and to make the system more efficient.
Other Latest Articles
- Synthesis and Characterization of ZnO and Mn-Doped ZnO Nanoparticles
- A Survey on Domain Name Categorization Using Artificial Neural Networks
- Automation of Examination System
- Simulation of Femur Bone Fracture in Car Accident using CT Scan Data and Finite Element Analysis
- Multi-Rotors: A Revolution In Unmanned Aerial Vehicle
Last modified: 2021-07-01 14:26:37