Key Exposure Resilience for Cloud Storage Auditing

Authors

  • J.S. Ande Dept. of CSE, Sanketika Vidya Parishad Engineering College, Visakhapatnam, India
  • A.S. Kumar Dept. of CSE, Sanketika Vidya Parishad Engineering College, Visakhapatnam, India
  • A.V. Kumar Dept. of CSE, Sanketika Vidya Parishad Engineering College, Visakhapatnam, India

Keywords:

Data storage, cloud storage auditing, de-duplication, cloud computation, key-exposure resistance, tile bitma

Abstract

Never days data is dynamically updated, the existing remote integrity examine the methods which served as a reason for static data can no longer be impose to authenticate the integrity of dynamic data in the cloud. In this scenario, cloud storage auditing carries an efficient and secure dynamic auditing protocol which pulls a confidence to the data owners that their data is correctly stored in the cloud. The existing auditing protocols assume that the secret key of the client is very secure while in reality, it is not. Therefore, to overcome these fault, this paper launches an idea of lessening the client’s secret key revelation. In this paper, we suggest a system where de-duplication strategy of data is taking on and it will verify the duplicity of data and eliminate the redundant one using MD5 hashing. Also, it uses tile bitmap method wherein it will identify the previous and the current versions of the data to ease the auditor’s workload and to make the system more efficient.

 

References

S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, pp.1-28, 2009.

S. Ayyub, D. Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Vol.1, Issue.4, pp.18-22, 2013.

J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,” from www.techcrunch.com, US, pp.1-2,2008.

Amazon.com, “Amazon s3 availability event: July 20, 2008,” Online at http://status.aws.amazon.com/s3-20080720.html, 2008.

S. Wilson, “Appengine outage”, Online at http://www. cio-weblog.com/50226711/appengine outage.php, June 2008.

B. Krebs, “Payment Processor Breach May Be Largest Ever”, Online at http://voices.washingtonpost.com/securityfix/ 2009/01/payment processor breach may b.html, Jan. 2009.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, “Provable data possession at untrusted stores” Provable data possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and communications security, Virginia, pp.598-609, 2007.

M. A. Shah, R. Swaminathan, M. Baker, “Privacypreserving audit and extraction of digital contents”, Cryptology ePrint Archive Report, Vol.2008, pp.1-21, 2008.

Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing”, LNCS Springer, vol.5789, pp.355–370, 2009.

A. Juels, J. Burton S. Kaliski, “Pors: Proofs of retrievability for large files”, Proceedings of the 14th ACM conference on Computer and communications security, NewYork, pp.584–597, 2007..

E. Thomas, R. Puttini, M. Zaigham, "Book of Cloud Computing: Concepts, Technology & Architecture", Prentice Hall, NewJersey, pp.1-528, 2013..

H. Shacham and B. Waters, “Compact proofs of retrievability”, in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107.

M. A. Shah, M. Baker, J. C. Mogul, R. Swaminathan, “Auditing to keep online storage services honest”, Proceeding HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems, SanDiego, pp.1-6, 2007.

Downloads

Published

2016-08-30

How to Cite

[1]
J. Ande, A. Kumar, and A. Kumar, “Key Exposure Resilience for Cloud Storage Auditing”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 4, no. 4, pp. 16–19, Aug. 2016.

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.