A secured cloud storage auditing with empirical outsourcing of key updates

被引:0
|
作者
Vijayakumar K. [1 ]
Suchitra S. [1 ]
Swathi Shri P. [1 ]
机构
[1] Department of Computer Science and Engineering, St. Joseph's Institute of Technology, Chennai
关键词
cloud computing; decryption; encryption; multi key encryption algorithm;
D O I
10.1504/ijris.2019.099846
中图分类号
学科分类号
摘要
Cloud computing is promising and considered next generation technology for computing. The current cloud storage auditing models require the client to update his secret keys in each time period which bring in local burdens to the client. The aim of the project is to make the key updates transpicuous to the client and present a new model for auditing cloud storage with provable outsourcing of updated keys. In this model, the key updates are sent to a third party auditor (TPA) who reduces the local burden on the client. In addition, the TPA will audit whether the files in cloud are stored correctly by a challenge-response protocol between the cloud and TPA at regular time. The proposed paradigm permits the client to authenticate the validity of the encrypted secret key produced by the TPA for uploading data to the cloud. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:109 / 114
页数:5
相关论文
共 50 条
  • [21] Public Auditing: Cloud Data Storage
    Parwekar, Pritee
    Saxena, Mayuri
    Kumar, Prakash
    Saxena, Sakshi
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 169 - 173
  • [22] Auditing Protocols for Cloud Storage: A Survey
    Shen, Jun
    Ji, Sai
    Shen, Jian
    Fu, Zhangjie
    Wang, Jin
    2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 222 - 227
  • [23] Auditing-as-a-Service for Cloud Storage
    Abo-alian, Alshaimaa
    Badr, N. L.
    Tolba, M. F.
    INTELLIGENT SYSTEMS'2014, VOL 1: MATHEMATICAL FOUNDATIONS, THEORY, ANALYSES, 2015, 322 : 559 - 568
  • [24] Public Data Auditing with Constrained Auditing Number for Cloud Storage
    Yang, Guangyang
    Xia, Hui
    Shen, Wenting
    Jiang, Xiuxiu
    Yu, Jia
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 21 - 32
  • [25] Secured Key Escort Services in Cloud Computing
    Kumawat, Ramavatar
    Singh, Sandeep
    Prajapati, Manohar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (08): : 109 - 113
  • [26] A SECURED CLOUD STORAGE TECHNIQUE TO IMPROVE SECURITY IN CLOUD INFRASTRUCTURE
    SenthilKumar, M.
    Kumar, M.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 97 - 102
  • [27] Secured Outsourcing Towards a Cloud Computing Environment Based on DNA Cryptography
    Hammami, Hamza
    Brahmi, Hanen
    Ben Yahia, Sadok
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 31 - 36
  • [28] ChainFS: Blockchain-Secured Cloud Storage
    Zou, Qiwu
    Tang, Yuzhe
    Chen, Ju
    Li, Kai
    Kamhoua, Charles A.
    Kwiat, Kevin
    Njilla, Laurent
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 987 - 990
  • [29] SECURED CLOUD STORAGE SCHEME BASED ON BLOCKCHAIN
    Matissi, N'Taya
    Li, Li Jian
    PROCEEDINGS OF 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION AND COMMUNICATION TECHNOLOGY (ICEICT 2019), 2019, : 137 - 142
  • [30] Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
    Liu, Chang
    Chen, Jinjun
    Yang, Laurence T.
    Zhang, Xuyun
    Yang, Chi
    Ranjan, Rajiv
    Kotagiri, Ramamohanarao
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) : 2234 - 2244