ROBUST KEY REVELATION OF PUBLIC AUDITING PROTOTYPE FOR SECURE CLOUD STORAGE
نویسندگان
چکیده
In cloud storage the data clients can remotely store their and use on-demand high- quality applications. Data outsourcing users are reassured from trouble of maintenance when put in huge size on cloud, integrity protection is a challenging one which enabling public audit for security. Users ask an external inspection third party to check out sourced data. However, such scheme, malicious might still forge valid authenticators later than key-revelation time period if it obtains current secret key Client. this paper, propose prototype named Robust Key Revelation auditing secure storage, security not only earlier but also revelation be preserved. Formalized definition model new kind design concrete scheme. proposed prototype, one-time doesn’t affect other periods. The accurate proof experimental results demonstrate that achieves desirable efficiency with intervals. Keywords: Secure Cloud Storage, Revelation, Security, Client, Public Auditing.
منابع مشابه
Privacy-Preserving Public Auditing for Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...
متن کاملPrivacy-Preserving Public Auditing for Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...
متن کاملPrivacy Preserving Public Auditing for Secure Cloud Storage - Replica
Using cloud computing user will be able to store and secure their data without burden of local computer. Additionally, users should be able to just use the cloud storage as if it is local, without distressing about the need to verify its integrity. By enabling and using public audit for cloud storage, it can check the integrity of the data. Finding data that are corrupted using this is difficul...
متن کاملPublic Auditing For Secure Cloud Storage with HLA
Cloud computing is internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a very challenging and potentially formidable task, especially for users with constrained computing resources a...
متن کاملOn the security of auditing mechanisms for secure cloud storage
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preser...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Scientific Journal Of Research In Engineering And Management
سال: 2022
ISSN: ['2582-3930']
DOI: https://doi.org/10.55041/ijsrem11717