+(91) 99007-25045
support@evolettechnologies.com
Enabling Cloud Storage Auditing With
Verifiable Outsourcing of Key Updates
  • Enabling Cloud Storage Auditing With
Verifiable Outsourcing of Key Updates

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Sold By Final year Student Project
Categories: , Tags: , , , , ,
  • Description
  • Reviews (0)

Product Description

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Key-exposure resistance has always been an important issue for in-depth cyber defense in many security applications. Recently, the model to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. The client has to update his secret keys in every time period inorder to address the security challenges.

This may inevitably bring new local, burdens to the client, especially those with limited computation resources, such as mobile phones. The proposed system focuses on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, Enabling Cloud Storage Auditing With Verifiable Outsourcing key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal.

In particular, the third party auditor (TPA) is leveraged in many existing public auditing designs to make it in charge of both storage auditing and secure key updates for key-exposure resistance by playing the role of authorized party. TPA only needs to hold an encrypted version of the client’s secret key while doing all the burdensome tasks on behalf of the client.

The client only needs to download the encrypted secret key from the TPA when uploading new files to cloud. Besides, proposed design also equips the client with capability to further verify the validity of the encrypted secret keys provided by the TPA. All these salient features are carefully designed to make the whole auditing procedure with key exposure resistance as transparent as possible for the client. The security proof and the performance simulation shows that proposed design instantiations are secure and efficient.

Reviews

There are no reviews yet. Add a review