Empowering Cloud Storage Examining With Certain Outsourcing of Key Updates

M. Akhila, M. Purushotham, Suresh Akella

Abstract


Currently, the amount of gentle data produced by many organizations is out stripping their storage ability. The management of such huge amount of data is quite costly due to the necessities of high storage capacity and skilled personnel. In this paper, we gathered the idea happening this new part of cloud storage auditing. We analyze how to diminish destruction of the customer's key scope in cloud storage auditing, and give the essential sensible answer for this unique trouble setting. We commend the significance and the shelter model of auditing convention with key-scope adaptability and propose such a convention. In our arrangement, we use the preorder traversal method and the twofold tree structure to illuminate the private keys for the customer. Not with standing grow an oval authenticator structure to maintain the forward security and the advantages.


Full Text:

PDF




Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org