Key Exposure in Cloud Data Services

K Amarkantha Reddy

Abstract


Cloud storage auditing is viewed as a very important service to verify the integrity of the info publically cloud. Current auditing protocols area unit all supported the idea that the client’s secret key for auditing is completely secure. However, such assumption might not continuously be command, thanks to the presumably weak sense of security and/or low security settings at the consumer. If such a secret key for auditing is exposed, most of the present auditing protocols would inevitably become unable to figure. During this paper, we have a tendency to specialize in this new facet of cloud storage auditing. We have a tendency to investigate a way to scale back the injury of the client’s key exposure in cloud storage auditing, and provides the primary sensible resolution for this new downside setting. We formalize the definition and therefore the security model of auditing protocol with key-exposure resilience and propose such a protocol. In our style, we have a tendency to use the binary tree structure and therefore the pre-order traversal technique to update the key keys for the consumer. We conjointly develop a unique appraiser construction to support the forward security and therefore the property of block less verifiability. The safety proof and therefore the performance analysis show that our projected protocol is secure and economical.


Full Text:

PDF




Copyright (c) 2018 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org