Efficient and Secure Auditing of Cloud Data with Key -Updating
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud. The existing auditing protocols are based on the assumption that the clients secret key for auditing is secure. In practical the secret key is not absolutely secure due to weak security settings at the client. If secret key for auditing is exposed, most of the current auditing protocols become unable to work. This paper focus on how to solve the problem of key-exposure in public cloud and give the practical solution for it. In the proposed design, use a binary tree structure and the preorder traversal technique to update the clients secret keys. Also develop a novel authenticator construction for forward security and the property of blockless verifiability. The secret key updating is done by a trusted authority and the updating process is done automatically. If the verification result is negative then it is possible to retrieve the original data.

Keywords: cloud computing, third party auditor, cloud storage auditing, homomorphic linear authenticator, key-exposure resistance

Edition: Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Share this Article

How to Cite this Article?

Niranjana S, Manjusha M S, "Efficient and Secure Auditing of Cloud Data with Key -Updating", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163986, Volume 5 Issue 5, May 2016, 2242 - 2246

72 PDF Views | 58 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Bird's Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and It's Types in Mobile Network

Palak Jain

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1063 - 1066

A Survey on Automatic Fault Detection Framework for Cloud based Application

Kshitija Nandgaonkar, Swarupa Kamble

Share this Article

Similar Articles with Keyword 'third party auditor'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1387 - 1390

System for Secure Storage and Auditing of Cloud Data

Pooja Jaywant Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1402 - 1403

A Review on Fine Grain Level Trust Enhancement between CU and CSP in Replication Jobs

Dr. Sandeep Singh Kang, Hardeep Kaur

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Similar Articles with Keyword 'cloud storage auditing'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

Share this Article

Similar Articles with Keyword 'homomorphic linear authenticator'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 2328 - 2331

Detection of Packet Dropping Attacks in Wireless Ad-Hoc Network Based On Privacy Preserving Public Auditing

Kirti B. Mane, N. J. Pathan

Share this Article

Similar Articles with Keyword 'key-exposure resistance'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

Share this Article
Top