UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 10 | October 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 9
September-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRE006044


Registration ID:
187669

Page Number

264-270

Share This Article


Jetir RMS

Title

ENABLING CLOUD STORAGE AUDITINGVERIFYING WITH VALIDREDISTRIBUTE KEY CHANGE

Abstract

Key-exposure resistance has always been animportant issue for in-depth cyber defence in many securityapplications. Recently, how to deal with the key exposure problemin the settings of cloud storage auditing has been proposed andstudied. To address the challenge, existing solutions all requirethe client to update his secret keys in every time period, whichmay inevitably bring in new local burdens to the client, especiallythose with limited computation resources, such as mobile phones.In this paper, we focus on how to make the key updates astransparent as possible for the client and propose a new paradigmcalled cloud storage auditing with verifiable outsourcing of keyupdates. In this paradigm, key updates can be safely outsourcedto some authorized party, and thus the key-update burden on theclient will be kept minimal. In particular, we leverage the thirdparty auditor (TPA) in many existing public auditing designs, letit play the role of authorized party in our case, and make it incharge of both the storage auditing and the secure key updates forkey-exposure resistance. In our design, TPA only needs to hold anencrypted version of the client’s secret key while doing all theseburdensome tasks on behalf of the client. The client only needs todownload the encrypted secret key from the TPA when uploadingnew files to cloud. Besides, our design also equips the client withcapability to further verify the validity of the encrypted secretkeys provided by the TPA. All these salient features are carefullydesigned to make the whole auditing procedure with key exposureresistance as transparent as possible for the client. We formalizethe definition and the security model of this paradigm. Thesecurity proof and the performance simulation show that ourdetailed design instantiations are secure and efficient.

Key Words

Cite This Article

"ENABLING CLOUD STORAGE AUDITINGVERIFYING WITH VALIDREDISTRIBUTE KEY CHANGE", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 9, page no.264-270, September-2018, Available :http://www.jetir.org/papers/JETIRE006044.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"ENABLING CLOUD STORAGE AUDITINGVERIFYING WITH VALIDREDISTRIBUTE KEY CHANGE", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 9, page no. pp264-270, September-2018, Available at : http://www.jetir.org/papers/JETIRE006044.pdf

Publication Details

Published Paper ID: JETIRE006044
Registration ID: 187669
Published In: Volume 5 | Issue 9 | Year September-2018
DOI (Digital Object Identifier):
Page No: 264-270
Country: Chennai, Tamil Nadu, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003083

Print This Page

Current Call For Paper

Jetir RMS