Loading

Outsource Key Updates for Cloud Storage Auditing with Key-Exposure Resilience
K. Rameshwaraiah1, Srinivasa Babu Kasturi2, M. Swapna3

1K. Rameshwaraiah, Professor, Department of CSE, Nalla Narasimha Reddy Education Society Group of Institutions, Hyderabad (Telangana), India.
2Srinivasa Babu Kasturi, Professor, Department of CSE, Nalla Narasimha Reddy Education Society Group of Institutions, Hyderabad (Telangana), India.
3M. Swapna, M.Tech Student, Department of CSE, Nalla Narasimha Reddy Education Society Group of Institutions, Hyderabad (Telangana), India.
Manuscript received on 24 April 2019 | Revised Manuscript received on 02 May 2019 | Manuscript Published on 08 May 2019 | PP: 325-328 | Volume-7 Issue-5S3 February 2019 | Retrieval Number: E11600275S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud Storage has also been increasing in recognition these days because of a few of the identical motives as Cloud Computing. Cloud Storage promises virtualized storage on demand, over a network based on a request for a given Quality-of-Service (QoS). Although cloud storage provides super benefit to users, it brings new safety hard issues. One essential safety hassle is a way to efficiently check the integrity of the statistics saved in cloud. In current years, many auditing protocols for cloud storage had been proposed to cope with this trouble. The key publicity problem, as another vital hassle in cloud storage auditing, has been taken into consideration recently. Hence, the intention of this paper is to design a cloud storage auditing protocol that may fulfill above requirements to acquire the outsourcing of key updates. We suggest a novel paradigm known as cloud storage auditing with verifiable outsourcing of key updates. In this new paradigm, key-update operations aren’t performed by the client, but by way of a Third Party Auditor (TPA).
Keywords: Cloud Storage, Auditing, Third Party Auditor, Key Exposure.
Scope of the Article: Storage-Area Networks