Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,989 Hits in 5.2 sec

Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience

S. Mary Virgil Nithya, V. Rhymend Uthariaraj
2020 Security and Communication Networks  
It protects the security of Identity-based cloud storage auditing in time periods both earlier and later to the time period of the exposed key. It also provides support for batch auditing.  ...  But with the exposure of the auditing secret key to the Cloud Service Provider, cloud auditing becomes unsuccessful, however strong the auditing schemes may be.  ...  Jayaprakash, Emeritus Professor, formerly with IIT Madras, for his constant support and encouragement which helped to complete the work successfully.  ... 
doi:10.1155/2020/4838497 fatcat:cptza4krh5hezhvanbxpoffnze

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

V Anusuya, V Kirubavathi, K Kowsalyaa, S Fathima
2018 International Journal of Innovative Research in Computer Science and Engineering (IJIRCSE) www.ioirp.com   unpublished
An innovative paradigm called strong key-exposure resilient auditing for secure cloud storage which allows to set a particular time period for the key exposure.  ...  The security issue of key exposure is one of the major problems in cloud storage auditing. To overcome this issue, initially the key-exposure resilience scheme had been proposed.  ...  VI.CONCLUSION This paper has dealt with the key exposure problem in cloud storage auditing using a new paradigm called strong key exposure resilient auditing for cloud storage.  ... 
fatcat:4vvpyjmmavcnplsp4avyf5utgy

An improved strong key exposure resilient auditing for cloud storage auditing

R Ahila, Dr. Sivakumari
2018 International Journal of Engineering & Technology  
So in this paper, improved strong key exposure resilient auditing is introduced to solve the key exposure security problem and improve the security of cloud storage.  ...  For cloud storage auditing, key exposure is a serious security problem which is solved by updating client secret keys regularly. However, this leads to local burdens to clients.  ...  Conclusion This paper handles the problem of key exposure in cloud storage auditing by strong key exposure resilient auditing scheme.  ... 
doi:10.14419/ijet.v7i4.15742 fatcat:6zyhyocjjzcbtoxb2pcmax23si

EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN

Prof Chethan Raj C, Shivani M S, Sowjanya D R, Sowmya M T, Tejaswini D R
2020 International Journal of Innovative Research in Computer Science & Technology  
USB token, smart card) for storing the private key and memorizing a password to trigger the private key.  ...  An individual would like to enroll his private key to create the authenticators for understanding the auditing of data integrity in certain, but not all of the current system.  ...  ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental  ... 
doi:10.21276/ijircst.2020.8.4.9 fatcat:5375uqbzungm3opqzjkv7fhw5i

Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme

Haifeng Li, Liangliang Liu, Caihui Lan, Caifen Wang, He Guo
2020 IEEE Access  
In addition, the lattice basis delegation technique is adopted to achieve forward security for resisting key exposure attack.  ...  INDEX TERMS Cloud storage, public auditing, identity-based, lattice-assumptions.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous referees for their valuable comments and constructive suggestions to improve the quality of this article.  ... 
doi:10.1109/access.2020.2991579 fatcat:sjlyxvsf5fd5vhiyhayf5ysi64

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
Finally, we discuss several open research topics of data security for cloud storage.  ...  Secondly, we give a detailed analysis on challenges and requirements of data security and privacy protection in cloud storage system.  ...  data security for cloud storage.  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

FUZZY IDENTITY-BASED DATA INTEGRITY AUDITING FOR DEPENDABLE CLOUD STORAGE SYSTEMS

2020 International journal for advanced research in science & technology  
We formalize the framework model and the security model for this new crude.  ...  Information honesty, a center security issue in solid distributed storage, has gotten a lot of consideration.  ...  Outsource key updates for cloud storage auditing with key-exposure resilience. Cloud storage auditing protocol with verifiable outsourcing of key updates.  ... 
doi:10.48047/ijarst/v10/i11/06 fatcat:h4mruxwojrgqpcyjfxrk46of5q

A Survey of : Securing Cloud Data under Key Exposure

2018 International Journal of Advanced Trends in Computer Science and Engineering  
Our evaluation results suggest that Bastion is well-suited for integration in existing systems since it incurs less than 5% overhead compared to existing semantically secure encryption modes.  ...  We also discuss practical insights with respect to the integration of Bastion in commercial dispersed storage systems.  ...  AIM The aim of this paper is to investigate how to reduce the damage of the client's key exposure in cloud storage auditing.  ... 
doi:10.30534/ijatcse/2018/01732018 fatcat:zjwvk5ceabfffmgufw6jwyqriq

A Secure Auditing Framework for Load Balancing in Cloud Environment

R. Geetha, T. Padmavathy
2020 Zenodo  
Security audit is an important aspect or feature to be considered in cloud service customer. It is basically a certification process to audit the controls that deliver the security requirements.  ...  Security audits are conducted by trained and qualified staffs that belong to an independent auditing organization. Security audits must be carried as a standard of security controls.  ...  The exposure of key cannot affect the security of authenticators that are developed before the key exposure time period.  ... 
doi:10.5281/zenodo.3669244 fatcat:hdnld2iynzdjpcivqxeptfarhy

Data Confidentiality in Cloud Storage. A Survey [chapter]

Shekhar S Kausalye, Sanjeev Kumar Sharma
2021 Advances in Parallel Computing  
transform, grid storage system, key exposure, secret sharing, AONT (All or Nothing Transform), dispersed storage, trust, block encryption mechanism, attribute-based encryption, access control will be  ...  In cloud computing security, privacy and data confidentiality plays important role when popularity in terms of cloud computing services is consider.  ...  Acknowledgment Authors are thankful to Department of Computer Science and Engineering, Oriental University, Indore for their contentious supports.  ... 
doi:10.3233/apc210257 fatcat:svs47h3hdvfntiihydxmwytqm4

A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
hiding for secure cloud storage.  ...  At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud.  ...  To reduce users' key exposure, Yu et al. proposed keyexposure resilient remote data integrity auditing schemes based on key update technique The data sharing is an important application in cloud storage  ... 
doi:10.35940/ijitee.a1019.1191s19 fatcat:lxdc7ufngbhj5hlga23wrbttzm

A Literature Survey on Integrity Verification Techniques

Anusha Priya G, Mrs. Esther Daniel
2015 International Journal of Engineering Research and  
It is a secure way for writing the data in the persistent data storage which can be retrieved in the same layout as it was stored later.  ...  servers for the security and integrity of users data.  ...  In [15] an efficient and secure dynamic auditing protocol for data storage in cloud computing privacy-preserving auditing protocol is used.  ... 
doi:10.17577/ijertv4is050131 fatcat:vabdrlq5e5hdjafz6st5pedkny

Lightweight Cloud Storage Auditing with Deduplication Supporting Strong Privacy Protection

Wenting Shen, Ye Su, Rong Hao
2020 IEEE Access  
INDEX TERMS Cloud storage auditing, deduplication, strong privacy protection, data security, cloud storage.  ...  In the proposed scheme, we design a novel method to generate the file index for duplicate check, and use a new strategy to generate the key for file encryption.  ...  By utilizing key update technique, Yu et al. [35] , [36] , Yu and Wang [37] proposed cloud storage auditing schemes with key-exposure resilience. Shen et al.  ... 
doi:10.1109/access.2020.2977721 fatcat:jkw4pmosbvdelcotpxjiti2z6y

Secure Cloud Computing with Third Party Auditing: A Survey

Laxmikant Mishra, Amit Kumar Sharma
2014 International Journal of Computer Applications  
As the services are sharing within different cloud users and the accessibility are also different. So the security issues in cloud computing environment are a major concern.  ...  As the users totally rely on the cloud vendors, so there is a need of data protection and the data control from the cloud users.  ...  But the security concerns are the major key aspects in the future cloud computing era.  ... 
doi:10.5120/18142-9375 fatcat:jia35erytvclzhjlotwvfquqv4

STRATUS: Towards Returning Data Control to Cloud Users [chapter]

Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gill Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, Geoffrey Holmes
2015 Lecture Notes in Computer Science  
Despite being transferred across and within clouds over encrypted channels, data often has to be decrypted within the database for it to be processed.  ...  awareness, revocation, attribution and data resilience.  ...  Acknowledgements This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz), a science investment project  ... 
doi:10.1007/978-3-319-27161-3_6 fatcat:mberng3n2zhslmosqcqf3nraau
« Previous Showing results 1 — 15 out of 1,989 results