Efficient Remote Data Integrity Checking With Securely Outsourcing of Key Updates

Authors

  • R. Shanthini  Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India
  • Prof. A. Padma  Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India

Keywords:

TPA, Data Integrity, searchable encryption, Cloud computing, CRM, API, LAN, WAN, MAN

Abstract

Key-exposure resistance has always been an important issue for in-depth cyber defense in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources such as mobile phones. In this paper, we focus on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal. Specifically, we leverage the third party auditor (TPA) in many existing public auditing designs, let it play the role of authorized party in our case, and make it in charge of both the storage auditing and the secure key updates for key-exposure resistance. In our design, TPA only needs to hold an encrypted version of the client’s secret key, while doing all these burdensome tasks on behalf of the client. The client only needs to download the encrypted secret key from the TPA when uploading new files to cloud. Besides, our design also equips the client with capability to further verify the validity of the encrypted secret keys provided by TPA.

References

  1. M. J. Atallah, K. Pantazopoulos, J. R. Rice, and E. E. Spafford, “Secure outsourcing of scienti?c computations,” Trends in Software Engineering, vol. 54, pp. 215-272 2002.
  2. D. Benjamin and M. J. Atallah, “Private and cheatingfree outsourcing of algebraic computations,” Proc. Sixth Annual Conference on Privacy, Security and Trust, pp. 240-245, 2008.
  3. C.Wang, K. Ren, and J.Wang, “Secure and practical outsourcing of linear programming in cloud computing,” IEEE INFOCOM 2011, pp. 820-828, 2011.
  4. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New Algorithms for Secure Outsourcing of Modular Exponentiations,” Proc. 17th European Symposium on Research in Computer Security, pp. 541-556, 2012.
  5. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security, pp. 598-609, 2007.
  6. A. Juels, J. Burton, and S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. 14th ACM Conf. Computer and Comm. Security, pp. 584-597, 2007.
  7. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Advances in Cryptology-Asiacrypt’08, pp. 90-107, 2008.
  8. G. Ateniese, R.D. Pietro, L. V. Mancini, and G. Tsudik,“Scalable and Ef?cient Provable Data Possession,” Proc.  4th International Conference on Security and Privacy in Communication Networks, 2008
  9. F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, “Ef?cient Remote Data Integrity checking in Critical Information Infrastructures,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1-6, 2008.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
R. Shanthini, Prof. A. Padma, " Efficient Remote Data Integrity Checking With Securely Outsourcing of Key Updates, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.864-868, March-April-2017.