Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016
Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud. The existing auditing protocols are based on the assumption that the clients secret key for auditing is secure. In practical the secret key is not absolutely secure due to weak security settings at the client. If secret key for auditing is exposed, most of the current auditing protocols become unable to work. This paper focus on how to solve the problem of key-exposure in public cloud and give the practical solution for it. In the proposed design, use a binary tree structure and the preorder traversal technique to update the clients secret keys. Also develop a novel authenticator construction for forward security and the property of blockless verifiability. The secret key updating is done by a trusted authority and the updating process is done automatically. If the verification result is negative then it is possible to retrieve the original data.
Keywords: cloud computing, third party auditor, cloud storage auditing, homomorphic linear authenticator, key-exposure resistance
Edition: Volume 5 Issue 5, May 2016
Pages: 2242 - 2246
How to Cite this Article?
Niranjana S, Manjusha M S, "Efficient and Secure Auditing of Cloud Data with Key -Updating", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163986, Volume 5 Issue 5, May 2016, 2242 - 2246
102 PDF Views | 85 PDF Downloads
Similar Articles with Keyword 'cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Similar Articles with Keyword 'third party auditor'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Informative Article, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1056 - 1059Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
Nikhitha K. Nair, Navin K. S.
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2124 - 2127A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation
Mahesh Shinde, Y.B.Gurav
Similar Articles with Keyword 'cloud storage auditing'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1821 - 1823A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance
Sneha Singha, S. D. Satav
Similar Articles with Keyword 'homomorphic linear authenticator'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 2328 - 2331Detection of Packet Dropping Attacks in Wireless Ad-Hoc Network Based On Privacy Preserving Public Auditing
Kirti B. Mane, N. J. Pathan
Similar Articles with Keyword 'key-exposure resistance'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1821 - 1823A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance
Sneha Singha, S. D. Satav