Efficient and Secure Auditing of Cloud Data with Key -Updating
ثبت نشده
چکیده
Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud. The existing auditing protocols are based on the assumption that the client’s secret key for auditing is secure. In practical the secret key is not absolutely secure due to weak security settings at the client. If secret key for auditing is exposed, most of the current auditing protocols become unable to work. This paper focus on how to solve the problem of key-exposure in public cloud and give the practical solution for it. In the proposed design, use a binary tree structure and the preorder traversal technique to update the client’s secret keys. Also develop a novel authenticator construction for forward security and the property of blockless verifiability. The secret key updating is done by a trusted authority and the updating process is done automatically. If the verification result is negative then it is possible to retrieve the original data.
منابع مشابه
Integrity Auditing with Homomorphic Encryption for Dynamic Cloud with Group user Revocation
With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. Recently, some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. An efficient public integrity auditing with a secur...
متن کاملPreserving privacy for secure and outsourcing for Linear Programming in cloud computing
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. we utilize the public key based homomorphism aut...
متن کاملSolving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten the security and privacy of users, which is of utmost importance for a real-world cloud storage. This can be solved by secure deduplication mechanisms which enables the user to encrypt the data on th...
متن کاملPublic Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy
Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user's private auditing key (as well as the authenticators those keys are associated with) without the user's re-possession of the data...
متن کاملAuditing Protocol for Secured Data Storage in Cloud
On cloud servers the data are hosted by the data owners and the data are accessed by the users from the cloud servers in cloud computing. As the data are outsourced, there are new security challenges been introduced by the new data hosting service that requires an independent auditing service in cloud to check the data integrity. There exist few remote integrity methods used for checking which ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016