Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{146278, author = {Lodugu Rushi Kesava and A. Siva Krishna Reddy}, title = {A Novel Technique for Auditing Through Key Exposure on Cloud Storage}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {4}, number = {12}, pages = {27-32}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=146278}, abstract = {Key-exposure resistance has continually been an crucial difficulty for in-depth cyber defence in lots of security programs. Recently, how to deal with the important thing exposure problem inside the settings of cloud garage auditing has been proposed and studied. To deal with the undertaking, current solutions all require the consumer to replace his secret keys in on every occasion duration, which may additionally inevitably carry in new local burdens to the purchaser, mainly people with constrained computation sources, together with cellular phones. In this paper, we awareness on a way to make the important thing updates as transparent as feasible for the consumer and suggest a brand new paradigm called cloud garage auditing with verifiable outsourcing of key updates. In this paradigm, key updates may be properly outsourced to a few authorized celebration, and as a result the key-replace burden on the purchaser will be stored minimal. In particular, we leverage the third party auditor (TPA) in lots of existing public auditing designs, allow it play the role of authorized birthday party in our case, and make it in charge of both the garage auditing and the secure key updates for keyexposure resistance. In our layout, TPA handiest needs to maintain an encrypted model of the patron’s mystery key at the same time as doing some of these burdensome responsibilities on behalf of the purchaser. The client most effective wishes to down load the encrypted secret key from the TPA whilst uploading new documents to cloud. Besides, our design also equips the patron with capability to further confirm the validity of the encrypted secret keys supplied through the TPA. All those salient capabilities are carefully designed to make the entire auditing procedure with key exposure resistance as obvious as possible for the customer. We formalize the definition and the security model of this paradigm. The protection evidence and the performance simulation display that our unique layout instantiations are comfy and green. }, keywords = {Cloud storage, outsourcing computing, cloud storage auditing, key update, verifiability.}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry