A Review on Enabling Cloud Storage Assessing with Verifiable Outsourcing of Key Updates

Authors(2) :-Shaik Meharaj, Dr T. Rama Chaitanya

If there should be an occurrence of digital barrier a few security applications Key-introduction resistance has all the time an imperative issue. As of late, the best approach to deal with the key introduction issue in the settings of Cloud storage inspecting has been proposed and examined. To manage this issue existing arrangements all need the customer to refresh his mystery enters in each day and age , which may definitely get new neighborhood weights to the customer especially those with constrained calculation assets, similar to cell phones. In this paper, we concentrate on the best way to make the key updates as straightforward as feasible for the customer and plan another worldview known as empowering Cloud storage evaluating with evident outsourcing of key updates. In this worldview, key updates can be outsourced to some approved gathering, and in this manner the key-refresh trouble on the customer will be kept insignificant. Specifically we tend to use the outsider reviewer (TPA) in a few existing open examining outlines, For our situation it assume the part of approved assembling, and make it responsible for both the capacity inspecting and furthermore the protected key updates for key-presentation resistance. In our plan TPA just needs to hold a scrambled adaptation of the customer's mystery key while doing all these difficult undertakings on behal f of the customer. The customer just requires downloading the encoded mystery key from the TPA while transferring new records to cloud. What's more, our plan likewise gives the customer capacity to additionally confirm the legitimacy of the encoded mystery keys gave by the TPA. All these remarkable highlights are precisely intended to make the whole inspecting strategy with key introduction resistance as straightforward as workable for the customer. We formalize the definition and furthermore the security model of this worldview the security verification and furthermore the execution recreation demonstrate that our point by point plan instantiations are secure and effective.

Authors and Affiliations

Shaik Meharaj
PG Scholar, Department of CSE, PACE Institute of Technology and Sciences,Vallur, Prakasam(Dt),, Andhrapradesh, India
Dr T. Rama Chaitanya
Associate Professor and HOD, Department of CSE, PACE Institute of Technology and Sciences,Vallur, Prakasam (Dt),, Andhrapradesh, India

TPA, Cloud Storage, Direct Variable Based Math, ESK

  1. J. Yu, K. Ren, C. Wang, and V. Varadharajan, "Enabling cloud storage auditing with key-exposure resistance," IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1167-1179, Jun. 2015.
  2. D. Chaum and T. Pedersen, "Wallet databases with observers," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1993,89-105.
  3. M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. E. Spafford, "Secure outsourcing of scientific computations," Adv. Comput., vol. 54, pp. 215-272, 2002.
  4. D. Benjamin and M. J. Atallah, "Private and cheating-free outsourcing of algebraic computations," in Proc. 6th Annu. Conf. Privacy, Secur. Trust, 2008, pp. 240-245.
  5. C. Wang, K. Ren, and J. Wang, "Secure and practical outsourcing of linear programming in cloud computing," in Proc. IEEE INFOCOM, Apr. 2011, pp. 820-828.
  6. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New algorithms for secure outsourcing of modular exponentiations," in Proc. 17th Eur. Symp. Res. Comput. Secur., 2012, pp. 541-556.
  7. G. Ateniese et al., "Provable data possession at untrusted stores," in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 598-609.
  8. A. Juels and B. S. Kaliski, Jr., "PORs: Proofs of retrievability for large files," in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 584-597.
  9. H. Shacham and B. Waters, "Compact proofs of retrievability," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2008, pp. 90-107.
  10. G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proc. 4th Int. Conf. Secur. Privacy Commun. Netw., 2008, Art. ID 9.
  11. F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, "Efficient remote data possession checking in critical information infrastructures," IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
  12. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiplereplica provable data possession," in Proc. 28th IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2008, pp. 411-420.
  13. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, "Efficient provable data possession for hybrid clouds," in Proc. 17th ACM Conf. Comput. Commun. Secur., 2010, pp. 756-758.
  14. C. Wang, K. Ren, W. Lou, and J. Li, "Toward publicly auditable secure cloud data storage services," IEEE Netw., vol. 24, no. 4, pp. 19-24, Jul./Aug. 2010.
  15. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
  16. K. Yang and X. Jia, "Data storage auditing service in cloud computing: Challenges, methods and opportunities," World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
  17. Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and C.-J. Hu, "Dynamic audit services for outsourced storages in clouds," IEEE Trans. Services Comput., vol. 6, no. 2, pp. 227-238, Apr./Jun. 2013.
  18. K. Yang and X. Jia, "An efficient and secure dynamic auditing protocol for data storage in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717-1726, Sep. 2013.
  19. H. Wang, "Proxy provable data possession in public clouds," IEEE Trans. Services Comput., vol. 6, no. 4, pp. 551-559, Oct./Dec. 2013.
  20. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacypreserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
  21. J. Yuan and S. Yu, "Public integrity auditing for dynamic data sharing with multiuser modification," IEEE Trans. Inf. Forensics Security, vol. 10, no. 8, pp. 1717-1726, Aug. 2015.
  22. S. Hohenberger and A. Lysyanskaya, "How to securely outsource cryptographic computations," in Proceedings of the Second international conference on Theory of Cryptography, ser. TCC’05. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 264-282.CONTROL ENGINEERING, Vol. 4.
  23. Kanchan Mahajan, Proff.J.S.Chitode, "Waste Bin Monitoring

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 433-440
Manuscript Number : CSEIT1831106
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Shaik Meharaj, Dr T. Rama Chaitanya, "A Review on Enabling Cloud Storage Assessing with Verifiable Outsourcing of Key Updates", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.433-440 , January-February-2018. |          | BibTeX | RIS | CSV

Article Preview