Contact Project Developer Ashish D. Tiwari [astiwz@gmail.com]
Download Synopsis Abstract
Cloud C#.NET ASP.NET BE-Engineering(CO/IT) ME-Engineering(CO/IT) BCS MCS BCA MCA MCM BSC Computer/IT MSC Computer/IT Diploma (CO/IT) IEEE-2016

Enabling Cloud Storage Auditing with Veri?able Outsourcing of Key Updates

Veri?able Outsourcing of Key Updates
Abstract-Synopsis-Documentation

Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates



Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources such as mobile phones. In this paper, we focus on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal. Specifically, we leverage the third party auditor (TPA) in many existing public auditing designs, let it play the role of authorized party in our case, and make it in charge of both the storage auditing and the secure key updates for key-exposure resistance. In our design, TPA only needs to hold an encrypted version of the client’s secret key, while doing all these burdensome tasks on behalf of the client. The client only needs to download the encrypted secret key from the TPA when uploading new files to cloud. Besides, our design also equips the client with capability to further verify the validity of the encrypted secret keys provided by TPA. All these salient features are carefully designed to make the whole auditing procedure with key exposure resistance as transparent as possible for the client. We formalize the definition and the security model of this paradigm. The security proof and the performance simulation show that our detailed design instantiations are secure and efficient.


Architecture:



PROPOSED SYSTEM

Cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources have been proposed to deal with this problem. These protocols focus on different aspects of cloud storage auditing such as the high efficiency the privacy protection of data the privacy protection of identities dynamic data operations the data sharing. Firstly proposed the notion of wallet databases with observers, in which hardware was used to help the client perform some expensive computations. The first outsourcing algorithm for modular exponentiations was proposed .which was based on the methods of precomputation and server-aided computation. A secure outsourcing algorithm to complete sequence comparisons. Proposed an outsourcing algorithm for attributebased signatures computations. The auditing protocols supporting dynamic data operations were also proposed auditing protocol supporting both the dynamic property and the privacy preserving property. The privacy preserving of the user’s identity for shared data auditing was considered in. The problem of user revocation in shared data auditing was considered in proposed a public auditing protocol for data sharing with multiuser modification. The proposed cloud storage auditing protocol with outsourcing of key updates is verifiable.


Comment is Only Available for registered users! Create Account or Login Now!