A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
2020
Security and Communication Networks
It protects the security of Identity-based cloud storage auditing in time periods both earlier and later to the time period of the exposed key. It also provides support for batch auditing. ...
But with the exposure of the auditing secret key to the Cloud Service Provider, cloud auditing becomes unsuccessful, however strong the auditing schemes may be. ...
Jayaprakash, Emeritus Professor, formerly with IIT Madras, for his constant support and encouragement which helped to complete the work successfully. ...
doi:10.1155/2020/4838497
fatcat:cptza4krh5hezhvanbxpoffnze
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
2018
International Journal of Innovative Research in Computer Science and Engineering (IJIRCSE) www.ioirp.com
unpublished
An innovative paradigm called strong key-exposure resilient auditing for secure cloud storage which allows to set a particular time period for the key exposure. ...
The security issue of key exposure is one of the major problems in cloud storage auditing. To overcome this issue, initially the key-exposure resilience scheme had been proposed. ...
VI.CONCLUSION This paper has dealt with the key exposure problem in cloud storage auditing using a new paradigm called strong key exposure resilient auditing for cloud storage. ...
fatcat:4vvpyjmmavcnplsp4avyf5utgy
An improved strong key exposure resilient auditing for cloud storage auditing
2018
International Journal of Engineering & Technology
So in this paper, improved strong key exposure resilient auditing is introduced to solve the key exposure security problem and improve the security of cloud storage. ...
For cloud storage auditing, key exposure is a serious security problem which is solved by updating client secret keys regularly. However, this leads to local burdens to clients. ...
Conclusion This paper handles the problem of key exposure in cloud storage auditing by strong key exposure resilient auditing scheme. ...
doi:10.14419/ijet.v7i4.15742
fatcat:6zyhyocjjzcbtoxb2pcmax23si
EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN
2020
International Journal of Innovative Research in Computer Science & Technology
USB token, smart card) for storing the private key and memorizing a password to trigger the private key. ...
An individual would like to enroll his private key to create the authenticators for understanding the auditing of data integrity in certain, but not all of the current system. ...
ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental ...
doi:10.21276/ijircst.2020.8.4.9
fatcat:5375uqbzungm3opqzjkv7fhw5i
Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme
2020
IEEE Access
In addition, the lattice basis delegation technique is adopted to achieve forward security for resisting key exposure attack. ...
INDEX TERMS Cloud storage, public auditing, identity-based, lattice-assumptions. ...
ACKNOWLEDGMENT The authors would like to thank the anonymous referees for their valuable comments and constructive suggestions to improve the quality of this article. ...
doi:10.1109/access.2020.2991579
fatcat:sjlyxvsf5fd5vhiyhayf5ysi64
Data Security and Privacy Protection for Cloud Storage: A Survey
2020
IEEE Access
Finally, we discuss several open research topics of data security for cloud storage. ...
Secondly, we give a detailed analysis on challenges and requirements of data security and privacy protection in cloud storage system. ...
data security for cloud storage. ...
doi:10.1109/access.2020.3009876
fatcat:6kcb3junlzhvvcq3qhztumpdqq
FUZZY IDENTITY-BASED DATA INTEGRITY AUDITING FOR DEPENDABLE CLOUD STORAGE SYSTEMS
2020
International journal for advanced research in science & technology
We formalize the framework model and the security model for this new crude. ...
Information honesty, a center security issue in solid distributed storage, has gotten a lot of consideration. ...
Outsource key updates for cloud storage auditing with key-exposure resilience. Cloud storage auditing protocol with verifiable outsourcing of key updates. ...
doi:10.48047/ijarst/v10/i11/06
fatcat:h4mruxwojrgqpcyjfxrk46of5q
A Survey of : Securing Cloud Data under Key Exposure
2018
International Journal of Advanced Trends in Computer Science and Engineering
Our evaluation results suggest that Bastion is well-suited for integration in existing systems since it incurs less than 5% overhead compared to existing semantically secure encryption modes. ...
We also discuss practical insights with respect to the integration of Bastion in commercial dispersed storage systems. ...
AIM The aim of this paper is to investigate how to reduce the damage of the client's key exposure in cloud storage auditing. ...
doi:10.30534/ijatcse/2018/01732018
fatcat:zjwvk5ceabfffmgufw6jwyqriq
A Secure Auditing Framework for Load Balancing in Cloud Environment
2020
Zenodo
Security audit is an important aspect or feature to be considered in cloud service customer. It is basically a certification process to audit the controls that deliver the security requirements. ...
Security audits are conducted by trained and qualified staffs that belong to an independent auditing organization. Security audits must be carried as a standard of security controls. ...
The exposure of key cannot affect the security of authenticators that are developed before the key exposure time period. ...
doi:10.5281/zenodo.3669244
fatcat:hdnld2iynzdjpcivqxeptfarhy
Data Confidentiality in Cloud Storage. A Survey
[chapter]
2021
Advances in Parallel Computing
transform, grid storage system, key exposure, secret sharing, AONT (All or Nothing Transform), dispersed storage, trust, block encryption mechanism, attribute-based encryption, access control will be ...
In cloud computing security, privacy and data confidentiality plays important role when popularity in terms of cloud computing services is consider. ...
Acknowledgment Authors are thankful to Department of Computer Science and Engineering, Oriental University, Indore for their contentious supports. ...
doi:10.3233/apc210257
fatcat:svs47h3hdvfntiihydxmwytqm4
A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
hiding for secure cloud storage. ...
At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud. ...
To reduce users' key exposure, Yu et al. proposed keyexposure resilient remote data integrity auditing schemes based on key update technique The data sharing is an important application in cloud storage ...
doi:10.35940/ijitee.a1019.1191s19
fatcat:lxdc7ufngbhj5hlga23wrbttzm
A Literature Survey on Integrity Verification Techniques
2015
International Journal of Engineering Research and
It is a secure way for writing the data in the persistent data storage which can be retrieved in the same layout as it was stored later. ...
servers for the security and integrity of users data. ...
In [15] an efficient and secure dynamic auditing protocol for data storage in cloud computing privacy-preserving auditing protocol is used. ...
doi:10.17577/ijertv4is050131
fatcat:vabdrlq5e5hdjafz6st5pedkny
Lightweight Cloud Storage Auditing with Deduplication Supporting Strong Privacy Protection
2020
IEEE Access
INDEX TERMS Cloud storage auditing, deduplication, strong privacy protection, data security, cloud storage. ...
In the proposed scheme, we design a novel method to generate the file index for duplicate check, and use a new strategy to generate the key for file encryption. ...
By utilizing key update technique, Yu et al. [35] , [36] , Yu and Wang [37] proposed cloud storage auditing schemes with key-exposure resilience. Shen et al. ...
doi:10.1109/access.2020.2977721
fatcat:jkw4pmosbvdelcotpxjiti2z6y
Secure Cloud Computing with Third Party Auditing: A Survey
2014
International Journal of Computer Applications
As the services are sharing within different cloud users and the accessibility are also different. So the security issues in cloud computing environment are a major concern. ...
As the users totally rely on the cloud vendors, so there is a need of data protection and the data control from the cloud users. ...
But the security concerns are the major key aspects in the future cloud computing era. ...
doi:10.5120/18142-9375
fatcat:jia35erytvclzhjlotwvfquqv4
STRATUS: Towards Returning Data Control to Cloud Users
[chapter]
2015
Lecture Notes in Computer Science
Despite being transferred across and within clouds over encrypted channels, data often has to be decrypted within the database for it to be processed. ...
awareness, revocation, attribution and data resilience. ...
Acknowledgements This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz), a science investment project ...
doi:10.1007/978-3-319-27161-3_6
fatcat:mberng3n2zhslmosqcqf3nraau
« Previous
Showing results 1 — 15 out of 1,989 results