A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

As data is dynamically updated in todays world, the existing remote integrity checking methods which served as a purpose for static data can no longer be enforced to authenticate the integrity of dynamic data in the cloud. In this scenario, cloud storage auditing conveys an efficient and secure dynamic auditing protocol which draws a confidence to the data owners that their data is correctly stored in the cloud. The present auditing protocols assume that the secret key of the client is very secure while in reality, it is not. Thus, to overcome these flaws, this paper introduces an idea of lessening the clients secret key disclosure. In this paper, we propose a system where de-duplication strategy of data is adopted and it will check the duplicacy of data and eliminate the redundant one using MD5 hashing. Also, it uses tile bitmap method wherin it will check the previous and the current versions of the data to ease the auditors workload and to make the system more efficient.

Keywords: Data storage, cloud storage auditing, de-duplication, cloud computation, key-exposure resistance, tile bitmap

Edition: Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

Share this Article

How to Cite this Article?

Sneha Singha, S. D. Satav, "A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151586, Volume 4 Issue 11, November 2015, 1821 - 1823

111 PDF Views | 93 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data storage'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2755 - 2763

An Efficient Frame of Reference for the Selection of Best Cloud Service Provider

Bhushan N B

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1912 - 1916

Survey on Privacy Preserving and Data Security Techniques

Pramila Kharat, Amar Buchade

Share this Article

Similar Articles with Keyword 'cloud storage auditing'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

Share this Article

Similar Articles with Keyword 'de-duplication'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1217 - 1219

Removing Dedepulication Using Pattern Serach Suffix Arrays

Pratiksha Dhande, Supriya Kumari, Sushmita Tupe, Laukik Shah

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 573 - 576

Big File Cloud Storage (BFCS): Distributed Storage Service with De-Duplication and Secure Storage

Sukruti Gajare, R. A. Khan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 99 - 106

Secure and Memory Efficient De-Duplication On Encrypted Data in Cloud Storage

Divya R, Arthi R, Indhumathi.M, Dr. U. V. Arivazhagu

Share this Article

Similar Articles with Keyword 'key-exposure resistance'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

Share this Article
Top