Efficient and Secure Auditing of Cloud Data with Key -Updating
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 5)Publication Date: 2016-05-05
Authors : Niranjana S; Manjusha M S;
Page : 2242-2246
Keywords : cloud computing; third party auditor; cloud storage auditing; homomorphic linear authenticator; key-exposure resistance;
Abstract
Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud. The existing auditing protocols are based on the assumption that the clients secret key for auditing is secure. In practical the secret key is not absolutely secure due to weak security settings at the client. If secret key for auditing is exposed, most of the current auditing protocols become unable to work. This paper focus on how to solve the problem of key-exposure in public cloud and give the practical solution for it. In the proposed design, use a binary tree structure and the preorder traversal technique to update the clients secret keys. Also develop a novel authenticator construction for forward security and the property of blockless verifiability. The secret key updating is done by a trusted authority and the updating process is done automatically. If the verification result is negative then it is possible to retrieve the original data.
Other Latest Articles
- Does Migrants are More Vulnerable to Substance Abuse? A Study of Mumbai Slum Migrants
- State and the Struggle for Sustainable Livelihood: Implications of Large Dams on the Brahmaputra Valley in Assam
- Accumulation of Thallium in the Sediments of River Kortalaiyar in Tamilnadu, India
- Basic Structure Principle and Application of High Precision Microcomputer Automatic Calorimeter
- Study of Switching Transients on EHV AC Transmission Line
Last modified: 2021-07-01 14:37:34