A secured cloud storage auditing with empirical outsourcing of key updates

被引:0
|
作者
Vijayakumar K. [1 ]
Suchitra S. [1 ]
Swathi Shri P. [1 ]
机构
[1] Department of Computer Science and Engineering, St. Joseph's Institute of Technology, Chennai
关键词
cloud computing; decryption; encryption; multi key encryption algorithm;
D O I
10.1504/ijris.2019.099846
中图分类号
学科分类号
摘要
Cloud computing is promising and considered next generation technology for computing. The current cloud storage auditing models require the client to update his secret keys in each time period which bring in local burdens to the client. The aim of the project is to make the key updates transpicuous to the client and present a new model for auditing cloud storage with provable outsourcing of updated keys. In this model, the key updates are sent to a third party auditor (TPA) who reduces the local burden on the client. In addition, the TPA will audit whether the files in cloud are stored correctly by a challenge-response protocol between the cloud and TPA at regular time. The proposed paradigm permits the client to authenticate the validity of the encrypted secret key produced by the TPA for uploading data to the cloud. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:109 / 114
页数:5
相关论文
共 50 条
  • [1] Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
    Yu, Jia
    Ren, Kui
    Wang, Cong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1362 - 1375
  • [2] Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing
    Zheng, Wenying
    Liu, Dengzhi
    Li, Xiong
    Sangaiah, Arun Kumar
    SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2020, 28
  • [3] Enabling Cloud Storage Auditing With Key-Exposure Resistance
    Yu, Jia
    Ren, Kui
    Wang, Cong
    Varadharajan, Vijay
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1167 - 1179
  • [4] Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    Ma, Jixin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1408 - 1421
  • [5] Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment
    Zheng, Wenying
    Lai, Chin-Feng
    He, Debiao
    Kumar, Neeraj
    Chen, Bing
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4238 - 4247
  • [6] Secured Privacy Data using Multi Key Encryption in Cloud Storage
    Reddy, Muthi P.
    Manjula, S. H.
    Venugopal, K. R.
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [7] Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
    Yu, Jia
    Wang, Huaqun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1931 - 1940
  • [8] Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation
    Abdul Rehman
    LIU Jian
    Muhammad Qasim Yasin
    LI Keqiu
    ChineseJournalofElectronics, 2021, 30 (03) : 489 - 499
  • [9] Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing
    Zhao, Pu
    Yu, Jia
    Zhang, Hanlin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (03) : 635 - 650
  • [10] Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation
    Rehman, Abdul
    Liu Jian
    Yasin, Muhammad Qasim
    Li Keqiu
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 489 - 499