ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)

Publication Date:

Authors : ; ;

Page : 1821-1823

Keywords : Data storage; cloud storage auditing; de-duplication; cloud computation; key-exposure resistance; tile bitmap;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

As data is dynamically updated in todays world, the existing remote integrity checking methods which served as a purpose for static data can no longer be enforced to authenticate the integrity of dynamic data in the cloud. In this scenario, cloud storage auditing conveys an efficient and secure dynamic auditing protocol which draws a confidence to the data owners that their data is correctly stored in the cloud. The present auditing protocols assume that the secret key of the client is very secure while in reality, it is not. Thus, to overcome these flaws, this paper introduces an idea of lessening the clients secret key disclosure. In this paper, we propose a system where de-duplication strategy of data is adopted and it will check the duplicacy of data and eliminate the redundant one using MD5 hashing. Also, it uses tile bitmap method wherin it will check the previous and the current versions of the data to ease the auditors workload and to make the system more efficient.

Last modified: 2021-07-01 14:26:37