Permitting Cloud Storage Auditing with Verifiable Outsourcing of Key Updates

Authors(2) :-Yadavalli Gopi, Vishnumsetti Saivenkata Manikanth

Cyber Defense shows that the depth of resistance is always important for the protection of applications; it is a big problem for many applications. Recently, to deal with the problem of cloud storage, audit setting and significant proposed study. Challenges, to cope with the current solution for mobile phones, especially when the customer will essentially be able to calculate such resources, bring them to the customer who will be updated with the new position of load of their secret essential key. The period is limited, as is. In this paper, we will be able to offer a new paradigm focus on cloud storage as possible to outsourcing customer and key updates, key updates to transparent audit. In this paradigm, it is important, then you can be efficient out of the safe party, and important updates to customer load will be minimized. TPA with our design, all legal actions of the customer, the customer is required to hold an encrypted version of a secret key. TPA secret key from encrypted download, upload new files to cloud client. In addition, the validity of our design to verify the encrypted secret key is fitted to customers with the ability to deliver TPA. Transparent resistance as possible with important performance features of the audit process carefully designed to make the customer. We include a formal security model definition and parameters. Safety instantiations that display on our detailed design and simulation shows are safe and effective performance.

Authors and Affiliations

Yadavalli Gopi
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
Vishnumsetti Saivenkata Manikanth
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Cloud storage, outsourcing computing, cloud storage auditing, key update, verifiability.

  1. M. J. Atallah, K. N. Pintzopoulos, J. R. Rice, and E. E. Spafford, "Secure outsourcing of scientific computations," Adv. Comput., vol. 54, pp. 215-272, 2002.
  2. D. Benjamin and M. J. Atallah, "Private and cheating-free outsourcing of algebraic computations," in Proc. 6th Annu. Conf. Privacy, Secure. Trust, 2008, pp. 240-245.
  3. C. Wang, K. Ren, and J. Wang, "Secure and practical outsourcing of linear programming in cloud computing," in Proc. IEEE INFOCOM, Apr. 2011, pp. 820-828.
  4. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New algorithms for secure outsourcing of modular exponentiations," in Proc. 17th Eur. Symp. Res. Comput. Secure. 2012, pp. 541-556.
  5. G. Ateniese et al., "Provable data possession at untrusted stores," in Proc. 14th ACM Conf. Comput. Commun. Secure. 2007, pp. 598-609.
  6. Juels and B. S. Kaliski, Jr., "PORs: Proofs of retrievability for large files," in Proc. 14th ACM Conf. Comput. Commun. Secure.2007, pp. 584-597.
  7. H. Shacham and B. Waters, "Compact proofs of retrievability," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2008, pp. 90-107.
  8. G. Ateniese, R. Di Pietro, L. V. Mancini, and G.Tsudik, "Scalable and efficient provable data possession," in Proc. 4th Int. Conf. Secure. Privacy Commun. Netw., 2008, Art. ID 9.
  9. F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, "Efficient remote data possession checking in critical information infrastructures," IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
  10. R. Curtmola, O. Khan, R. Burns, and G. Ateniese,"MR-PDP: Multiplereplica provable data possession," in Proc. 28th IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2008, pp. 411-420.
  11. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau, "Efficient provable data possession for hybrid clouds," in Proc. 17th ACM Conf. Comput. Commun. Secure. 2010, pp. 756-758.
  12. Wang, K. Ren, W. Lou, and J. Li, "Toward publicly auditable secure cloud data storage services,"
  13. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li,"Enabling public audit ability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
  14. K. Yang and X. Jia, "Data storage auditing service in cloud computing: Challenges, methods and opportunities," World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
  15. Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and C.-J. Hu, "Dynamic audit services for outsourced storages in clouds," IEEE Trans. Services Comput., vol. 6, no. 2, pp. 227-238, Apr./Jun. 2013.
  16. K. Yang and X. Jia, "An efficient and secure dynamic auditing protocol for data storage in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717-1726, Sep. 2013.

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-06
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 451-453
Manuscript Number : CSEIT1724117
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Yadavalli Gopi, Vishnumsetti Saivenkata Manikanth, "Permitting Cloud Storage Auditing with Verifiable Outsourcing of Key Updates", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.451-453 , July-August-2017.
Journal URL :

Article Preview

Follow Us

Contact Us