Full Paper View Go Back

Key Exposure Resilience for Cloud Storage Auditing

JS. 1 , e 2 , AS. Kumar3 , AV. Kumar4

Section:Review Paper, Product Type: Isroset-Journal
Vol.4 , Issue.4 , pp.16-19, Aug-2016


Online published on Sep 08, 2016


Copyright © JS. ,e, AS. Kumar, AV. Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: JS. ,e, AS. Kumar, AV. Kumar , “Key Exposure Resilience for Cloud Storage Auditing,” International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.4, pp.16-19, 2016.

MLA Style Citation: JS. ,e, AS. Kumar, AV. Kumar "Key Exposure Resilience for Cloud Storage Auditing." International Journal of Scientific Research in Computer Science and Engineering 4.4 (2016): 16-19.

APA Style Citation: JS. ,e, AS. Kumar, AV. Kumar , (2016). Key Exposure Resilience for Cloud Storage Auditing. International Journal of Scientific Research in Computer Science and Engineering, 4(4), 16-19.

BibTex Style Citation:
@article{Kumar_2016,
author = {JS. ,e, AS. Kumar, AV. Kumar },
title = {Key Exposure Resilience for Cloud Storage Auditing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2016},
volume = {4},
Issue = {4},
month = {8},
year = {2016},
issn = {2347-2693},
pages = {16-19},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=286},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=286
TI - Key Exposure Resilience for Cloud Storage Auditing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - JS. ,e, AS. Kumar, AV. Kumar
PY - 2016
DA - 2016/09/08
PB - IJCSE, Indore, INDIA
SP - 16-19
IS - 4
VL - 4
SN - 2347-2693
ER -

1279 Views    1258 Downloads    1290 Downloads
  
  

Abstract :
Never days data is dynamically updated, the existing remote integrity examine the methods which served as a reason for static data can no longer be impose to authenticate the integrity of dynamic data in the cloud. In this scenario, cloud storage auditing carries an efficient and secure dynamic auditing protocol which pulls a confidence to the data owners that their data is correctly stored in the cloud. The existing auditing protocols assume that the secret key of the client is very secure while in reality, it is not. Therefore, to overcome these fault, this paper launches an idea of lessening the client’s secret key revelation. In this paper, we suggest a system where de-duplication strategy of data is taking on and it will verify the duplicity of data and eliminate the redundant one using MD5 hashing. Also, it uses tile bitmap method wherein it will identify the previous and the current versions of the data to ease the auditor’s workload and to make the system more efficient.

Key-Words / Index Term :
Data storage; cloud storage auditing; de-duplication,; cloud computation; key-exposure resistance; tile bitma

References :
[1]. S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.
[2]. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, pp.1-28, 2009.
[3]. S. Ayyub, D. Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Vol.1, Issue.4, pp.18-22, 2013.
[4]. J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,” from www.techcrunch.com, US, pp.1-2,2008.
[5]. Amazon.com, “Amazon s3 availability event: July 20, 2008,” Online at http://status.aws.amazon.com/s3-20080720.html, 2008.
[6]. S. Wilson, “Appengine outage”, Online at http://www. cio-weblog.com/50226711/appengine outage.php, June 2008.
[7]. B. Krebs, “Payment Processor Breach May Be Largest Ever”, Online at http://voices.washingtonpost.com/securityfix/ 2009/01/payment processor breach may b.html, Jan. 2009.
[8]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, “Provable data possession at untrusted stores” Provable data possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and communications security, Virginia, pp.598-609, 2007.
[9]. M. A. Shah, R. Swaminathan, M. Baker, “Privacypreserving audit and extraction of digital contents”, Cryptology ePrint Archive Report, Vol.2008, pp.1-21, 2008.
[10]. Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing”, LNCS Springer, vol.5789, pp.355–370, 2009.
A. Juels, J. Burton S. Kaliski, “Pors: Proofs of retrievability for large files”, Proceedings of the 14th ACM conference on Computer and communications security, NewYork, pp.584–597, 2007..
[11]. E. Thomas, R. Puttini, M. Zaigham, "Book of Cloud Computing: Concepts, Technology & Architecture", Prentice Hall, NewJersey, pp.1-528, 2013.
[12]. H. Shacham and B. Waters, “Compact proofs of retrievability”, in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107.
[13]. M. A. Shah, M. Baker, J. C. Mogul, R. Swaminathan, “Auditing to keep online storage services honest”, Proceeding HOTOS`07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems, SanDiego, pp.1-6, 2007.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation