Skip to main content


Efficient Cloud Storage Auditing and Data Storage in Cloud Computing with Verifiable Outsourcing of Key Updates

Issue Abstract

Abstract
Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources such as mobile phones. In this paper, we focus on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal. Specifically, we leverage the third-party auditor (TPA) in many existing public auditing designs, let it play the role of authorized party in our case, and make it in charge of both the storage auditing and the secure key updates for key-exposure resistance. Index Terms—Cloud storage; outsourcing computing; cloud storage auditing; key update; verifiability.


Author Information
Mr. T.KAMALAKANNAN
Issue No
7
Volume No
3
Issue Publish Date
05 Jul 2017
Issue Pages
13-20

Issue References

References
1. M.J. Atallah, and K.B. Frikken, “Securely outsourcing linear algebra computations,” Proceedings of the 5th ACM Symposium on Information, pp.48-59, 2010.
2. X. Chen, J. Li, X. Huang, et al., “Secure Outsourced Attribute-based Signatures,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 12, pp. 3285- 3294, 2014.
3. F. Zhang, X. Ma, S. Liu, “Efficient computation out- sourcing for inverting a class of homomorphic functions,” Information Sciences, vol. 286, pp. 19-28, 2014.
4. B. Lynn, The pairing-based cryptographic library, online at http://crypto.Stanford.edu/pbc/, 2015.
5. B. Chevallier-Mames, J. Coron, N. McCullagh, D. Nac- cache, and M. Scott, “Secure delegation of ellipticcurve
pairing,” Proc. CARDIS 2010, pp.24-35, 2010.