About this Journal  |  Author Guidelines  |   Submit a Manuscript     

International Journal of Big Data Security Intelligence

Volume 4, No. 1, 2017, pp 15-20
http://dx.doi.org/10.21742/ijbdsi.2017.4.1.03

Abstract



Key Exposure in Cloud Data Services



    L. Jagajeevan Rao
    1100-100 Department of Computer Science and Engineering, KL University,Vaddeswaram, AP,

    Abstract

    Cloud storage auditing is viewed as a very important service to verify the integrity of the info publically cloud. Current auditing protocols area unit all supported the idea that the client’s secret key for auditing is completely secure. However, such assumption might not continuously be command, thanks to the presumably weak sense of security and/or low security settings at the consumer. If such a secret key for auditing is exposed, most of the present auditing protocols would inevitably become unable to figure. During this paper, we have a tendency to specialize in this new facet of cloud storage auditing. We have a tendency to investigate a way to scale back the injury of the client’s key exposure in cloud storage auditing, and provides the primary sensible resolution for this new downside setting. We formalize the definition and therefore the security model of auditing protocol with key-exposure resilience and propose such a protocol. In our style, we have a tendency to use the binary tree structure and therefore the pre-order traversal technique to update the key keys for the consumer. We conjointly develop a unique appraiser construction to support the forward security and therefore the property of block less verifiability. The safety proof and therefore the performance analysis show that our projected protocol is secure and economical.


 

Contact Us

  • PO Box 5074, Sandy Bay Tasmania 7005, Australia
  • Phone: +61 3 9028 5994