Secure Cloud Storage Auditing Protocol with Resisting Key-Exposure

Authors

  • N. Varalakshmi  Student. Department of MCA QIS College of Engineering &Technology, Ongole, Andhra Pradesh, India
  • K. Jaya Krishna  Assoc. Professor in Department of MCA, QIS College of Engineering& Technology, Ongole, Andhra Pradesh, India

Keywords:

Cloud Storage Auditing, Data Storage, Homomorphic Linear Authenticator, Key Exposure Resistance, Cloud Computation.

Abstract

In the cloud computing auditing is a vital service to keep up the trustworthiness. Existing looking at traditions are inside and out in light of the supposition that the User's secret key for auditing is completely secured. Such supposition may not by and large be held, because of the probable delicate doubt that all is well and great and also low security settings at the user. In a vast segment of the current assessing traditions would unavoidably get the chance to be particularly not ready to work when a riddle key for assessing is revealed. It is investigated on the most ideal approach to diminish the mischief of the user's key revelation in disseminated capacity assessing, and give the principle accommodating representation to this new issue setting. Formalized the definition and the security model of assessing tradition with key-introduction quality and propose such a tradition. Utilized and developed a novel authenticator advancement to refer the forward security and the property of part less verifiable nature using the present arrangement. The security check and the execution examination create the impression that the foreseen tradition is secured and proficient.

References

  1. Prof C. Wang, K. Ren, W. Lou, and J. Li, "Toward publicly auditable secure cloud data storage services," IEEE Netw., vol. 24, no. 4, pp. 19–24, Jul./Aug. 2010.
  2. K. Yang and X. Jia, "An efficient and secure dynamic auditing protocol for data storage in cloud computing," IEEE Trans. Parallel Distrib. Syst., mvol. 24, no. 9, pp. 1717–1726, Sep. 2013.
  3. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy preserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, Feb. 2013.
  4. Vijay varadhanajan , Jia Yu ,Kai Ren "Enabling Cloud Storage Auditing With Key Exposure Resistance" IEEE Transaction on information forensics and security,Vol 10.
  5. Priyadharshni, Geo Jenefer. G " Enhancing Data Security In Cloud Storage Auditing With Key Abstraction" Vo.2,Issue 2,Oct 2015.
  6. T Yawaikha,R Meyanand, " An Efficient Cloud Storage Batch Auditing Without Key Exposure Resistance Using Public Verifier" International conference on system 2016.
  7. C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," in Advances in Cryptology—ASIACRYPT. Berlin, Germany: Springer-Verlag, 2002, pp. 548–566.
  8. A. Juels and B. S. Kaliski, Jr., "PORs: Proofs of retrievability for large files," in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 584–597.
  9. Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of retrievability via hardness amplification," in Proc. 6th Theory Cryptogr. Conf., 2009, pp. 109–127.
  10. M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, "Auditing to keep online storage services honest," in Proc. 11th USENIX Workshop Hot Topics Oper. Syst., 2007, pp. 1–6.
  11. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, "Cooperative provable data possession for integrity verification in multicloud storage," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231–2244, Dec. 2012
  12. Sneha Singha"Survey Paper On Cloud Storage Auditing With Exposure Resistance" IJSR
  13. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, "Efficient provable data possession for hybrid clouds," in Proc. 17th ACM Conf. Comput. Commun. Secur., 2010, pp. 756–758.
  14. K. Yang and X. Jia, "Data storage auditing service in cloud computing: Challenges, methods and opportunities," World Wide Web, vol. 15, no. 4, pp. 409–428, 2012.
  15. H. Shacham and B. Waters, "Compact proofs of retrievability," in Advances in Cryptology—ASIACRYPT. Berlin, Germany: Springer-Verlag, 2008, pp. 90–107.
  16. G. Itkis and L. Reyzin, "SiBIR: Signer-base intrusion-resilient signatures," in Advances in Cryptology—CRYPTO. Berlin, Germany: Springer-Verlag, 2002, pp. 499–514.
  17. R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," in Advances in Cryptology—EUROCRYPT. Berlin, Germany: Springer-Verlag, 2003, pp. 255–271.
  18. F. Hu, C.-H. Wu, and J. D. Irwin, "A new forward secure signature scheme using bilinear maps," Cryptology ePrint Archive, Tech. Rep. 2003/188, 2003.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
N. Varalakshmi, K. Jaya Krishna, " Secure Cloud Storage Auditing Protocol with Resisting Key-Exposure, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1163-1168, March-April-2018.