
Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
Abstract
Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources, such as mobile phones. In this Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates paper, we focus on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal.
System Configuration
H/W System Configuration
Speed : 1.1 GHz
RAM : 256 MB(min)
Hard Disk : 20 GB
Floppy Drive : 1.44 MB
Key Board : Standard Windows Keyboard
Mouse : Two or Three Button Mouse
Monitor : SVGA
S/W System Configuration
Platform : cloud computing
Operating system : Windows Xp,7,
Server : WAMP/Apache
Working on : Browser Like Firefox, IE
Conclusion
In this paper, we study on how to outsource key updates for cloud storage auditing with key-exposure resilience. We pro-pose the first cloud storage auditing protocol with verifiable outsourcing of key updates. Key updates are outsourced to the TPA in this protocol and are transparent to the client. In addition, the TPA only sees the encrypted version of the secret key of the client, while the client can further verify the validity of the encrypted secret keys when downloading them from the TPA. We give the formal security proof and the performance simulation of the proposed scheme.