Enabling cloud storage auditing with key-exposure resilience under continual key-leakage

2020 ◽  
Vol 520 ◽  
pp. 15-30
Author(s):  
Chengyu Hu ◽  
Yuqin Xu ◽  
Pengtao Liu ◽  
Jia Yu ◽  
Shanqing Guo ◽  
...  
2015 ◽  
Vol 10 (6) ◽  
pp. 1167-1179 ◽  
Author(s):  
Jia Yu ◽  
Kui Ren ◽  
Cong Wang ◽  
Vijay Varadharajan
Keyword(s):  

2020 ◽  
Vol 2020 ◽  
pp. 1-13 ◽  
Author(s):  
S. Mary Virgil Nithya ◽  
V. Rhymend Uthariaraj

Secured storage system is a critical component in cloud computing. Cloud clients use cloud auditing schemes to verify the integrity of data stored in the cloud. But with the exposure of the auditing secret key to the Cloud Service Provider, cloud auditing becomes unsuccessful, however strong the auditing schemes may be. Therefore, it is essential to prevent the exposure of auditing secret keys, and even if it happens, it is necessary to minimize the damage caused. The existing cloud auditing schemes that are strongly resilient to key exposure are based on Public Key Infrastructure and so have challenges of certificate management/verification. These schemes also incur high computation time during integrity verification of the data blocks. The Identity-based schemes eliminate the usage of certificates but limit the damage due to key exposure, only in time periods earlier to the time period of the exposed key. Some of the key exposure resilient schemes do not provide support for batch auditing. In this paper, an Identity-based Provable Data Possession scheme is proposed. It protects the security of Identity-based cloud storage auditing in time periods both earlier and later to the time period of the exposed key. It also provides support for batch auditing. Analysis shows that the proposed scheme is resistant to the replace attack of the Cloud Service Provider, preserves the data privacy against the Third Party Auditor, and can efficiently verify the correctness of data.


2016 ◽  
Vol 145 (15) ◽  
pp. 11-14 ◽  
Author(s):  
V. Goutham ◽  
B. Mounika ◽  
P. Shiva
Keyword(s):  

2019 ◽  
Vol 472 ◽  
pp. 223-234 ◽  
Author(s):  
Xiaojun Zhang ◽  
Huaxiong Wang ◽  
Chunxiang Xu

2018 ◽  
Vol 7 (4) ◽  
pp. 2473
Author(s):  
R Ahila ◽  
Dr. Sivakumari

One of the most essential services of cloud computing is cloud storage. For cloud storage auditing, key exposure is a serious security problem which is solved by updating client secret keys regularly. However, this leads to local burdens to clients. A cloud source auditing with verifiable outsourcing of key updates paradigm was used to make the key updates as transparent for the client where Third Party Auditor (TPA) was played the role of authorized party. It holds only an encrypted version of client’s secret key. However, key exposure security problem is not fully solved by this scheme. So in this paper, improved strong key exposure resilient auditing is introduced to solve the key exposure security problem and improve the security of cloud storage. In the proposed paradigm, a novel key update technique is used where update message is created by TPA and it sends to the client. The client updates their signing secret key based on the update message and client’s private key. Moreover, public key is obtained from the client while updating a message which improves the security of cloud storage. Thus this scheme makes the malicious cloud unable to get the signing secret key in unexposed time periods. 


Sign in / Sign up

Export Citation Format

Share Document