A Survey on Cloud Storage Auditing Protocols

Main Article Content

Shabana Shaik, G. Vijay Kumar

Abstract

As Today�s world depends on dynamically updated data, the best way to store and update data is cloud storage service. The common issue for storing data in cloud storage is its security though every individual client holds his/her own secret key the key service has to be supportive and is effective to the customer in different situations, so key redesign of outsourcing is important. The key overhauls can be handled by some authorized inspector known as TPA (Third Party Auditor) to reduce key upgrade burden from customer. It is the responsible of TPA now, to save key upgrades and makes key updates transparent for client. In existing solutions, client has to update key by himself at periodic times which leads to problem for those who need to concentrate on their main role in the market or with the people who have limited resources. This paper encloses a survey on the key exposure problem in cloud storage is formulated where the main goal is that cloud storage settings and key updates are safely outsourced to some third party where TPA can only hold encrypted version of client secret key formalizing security model. Security proof can be analyzed and make sure that design is secure and efficient.

Article Details

How to Cite
, S. S. G. V. K. (2018). A Survey on Cloud Storage Auditing Protocols. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 4(3), 241–244. Retrieved from http://www.ijfrcsce.org/index.php/ijfrcsce/article/view/1299
Section
Articles