Providing Cloud Storage Auditing Through Verifiable Key Update Outsourcing
Keywords:
Cloud Storage, Outsourcing Computing, Cloud Storage Auditing, Key Update, Verifiability.Abstract
In many security applications, key-exposure resistance has long been a pressing concern for a comprehensive cyber defence strategy. How to address this critical exposure issue in the context of cloud storage auditing has been proposed and investigated as of late. Existing solutions to the problem necessitate that the client updates his secret keys at regular intervals, which can be a significant burden for clients with limited computational resources, like mobile phones. To provide maximum client transparency during key updates, we propose a novel paradigm in this paper: cloud storage auditing combined with the verifiable outsourcing of key updates. In this model, the client doesn't have to worry about keeping track of key updates because they can be safely delegated to a trusted third party. In particular, we adapt the role of the third-party auditor (TPA) from numerous existing public auditing designs, giving it responsibility for both the auditing of the storage and the security updates of keys in order to prevent key exposure. Our scheme requires TPA to keep only an encrypted copy of the client's secret key while performing these otherwise onerous tasks on the client's behalf. When transferring data to the cloud, the client only needs to get the encrypted secret key from the TPA. Further, our architecture provides the client with the means to confirm the authenticity of the TPA's supplied encrypted secret keys. The whole auditing process with key exposure resistance is made as clear to the client as possible by the inclusion of these prominent features. The definition and underlying security model of this paradigm are formally outlined. Our rigorously tested and simulated implementations of the detailed designs have proven to be safe and effective in practice.
References
- M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. E. Spafford, “Secure outsourcing of scientific computations,” Adv. Comput., vol. 54, pp. 215–272, 2002.
- D. Benjamin and M. J. Atallah, “Private and cheating-free outsourcing of algebraic computations,” in Proc. 6th Annu. Conf. Privacy, Secur. Trust, 2008, pp. 240–245.
- C. Wang, K. Ren, and J. Wang, “Secure and practical outsourcing of linear programming in cloud computing,” in Proc. IEEE INFOCOM, Apr. 2011, pp. 820–828.
- X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms for secure outsourcing of modular exponentiations,” in Proc. 17th Eur. Symp. Res. Comput. Secur., 2012, pp. 541–556.
- G. Ateniese et al., “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 598–609.
- A. Juels and B. S. Kaliski, Jr., “PORs: Proofs of retrievability for large files,” in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 584–597.
- H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2008, pp. 90–107.
- G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. 4th Int. Conf. Secur. Privacy Commun. Netw., 2008, Art. ID 9.
- F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034–1038, Aug. 2008.
- R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiplereplica provable data possession,” in Proc. 28th IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2008, pp. 411–420.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.