UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 7
July-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1807762


Registration ID:
185632

Page Number

288-296

Share This Article


Jetir RMS

Title

Effective Approach for Secure Outsourcing of Key Updates in Cloud

Abstract

One of the important service of cloud computing is cloud storage. The security of cloud storage faces many critical issues, among which key exposure resistance is one. To solve this issue, the best way is to use key redesign. Previously many existing solutions required client to update his secret key by himself that too for every time period which brings up a burden to the clients especially people from various organizations whose main motive is different from this issue. So, making the key updates transparent for client will be beneficial. Thus proposing a new paradigm called cloud storage auditing. Examining each procedure in the paradigm makes entire process secure and safe. The proposed protocol determines that key updates are safely outsourced to some authorized party known as TPA (Third party auditor). TPA who acts as interface between client and cloud performs all update operations on behalf of client but significantly TPA holds only encrypted version of key so that key is not exposed to anyone other than the owner. The client when needed to upload files to cloud can download the updated secret key from TPA and decrypt it. Apart from this, our design also provides client with a option of verifying the validity of encrypted secret key provided by TPA. These features help client to complete his cloud storage works in a secure method. A security model is designed to formulate this paradigm along with performance simulation.

Key Words

Cloud storage, Cloud storage auditing, Key update, Outsourcing computation

Cite This Article

"Effective Approach for Secure Outsourcing of Key Updates in Cloud ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 7, page no.288-296, July-2018, Available :http://www.jetir.org/papers/JETIR1807762.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Effective Approach for Secure Outsourcing of Key Updates in Cloud ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 7, page no. pp288-296, July-2018, Available at : http://www.jetir.org/papers/JETIR1807762.pdf

Publication Details

Published Paper ID: JETIR1807762
Registration ID: 185632
Published In: Volume 5 | Issue 7 | Year July-2018
DOI (Digital Object Identifier):
Page No: 288-296
Country: kurnool, andhra pradesh, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003073

Print This Page

Current Call For Paper

Jetir RMS