Enabling Cloud Storage Auditing With Key Exposure Resistance

Enabling Cloud Storage Auditing With Key-Exposure
Resistance
ABSTRACT:
Cloud storage auditing is viewed as an important service to verify the integrity of
the data in public cloud. Current auditing protocols are all based on the assumption
that the client’s secret key for auditing is absolutely secure. However, such
assumption may not always be held, due to the possibly weak sense of security
and/or low security settings at the client. If such a secret key for auditing is
exposed, most of the current auditing protocols would inevitably become unable to
work. In this paper, we focus on this new aspect of cloud storage auditing. We
investigate how to reduce the damage of the client’s key exposure in cloud storage
auditing, and give the first practical solution for this new problem setting. We
formalize the definition and the security model of auditing protocol with keyexposure resilience and propose such a protocol. In our design, we employ the
binary tree structure and the preorder traversal technique to update the secret keys
for the client. We also develop a novel authenticator construction to support the
forward security and the property of blockless verifiability. The security proof and
the performance analysis show that our proposed protocol is secure and efficient.

EXISTING SYSTEM:
 These protocols focus on several different aspects of auditing, and how to
achieve high bandwidth and computation efficiency is one of the essential

Contact: 040-40274843, 9533694296
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

com. insertion and deletion. has remained unexplored in previous researches. they have overlooked the possible weak sense of security and/or low security settings at the client. and any exposure of the client’s secret auditing key would make most of the existing auditing protocols unable to work correctly. In order to reduce the computational burden of the client. the Homomorphic Linear Authenticator (HLA) technique that supports blockless verification is explored to reduce the overheads of computation and communication in auditing protocols.  Unfortunately. DISADVANTAGES OF EXISTING SYSTEM:  Though many research works about cloud storage auditing have been done in recent years.in .org. previous auditing protocols did not consider this critical issue of how to deal with the client’s secret key exposure for cloud storage auditing.Enabling Cloud Storage Auditing With Key Exposure Resistance concerns.  The privacy protection of data is also an important aspect of cloud storage auditing. it is possible for the TPA to get the client’s data after it executes the auditing protocol multiple times. For that purpose. Contact: 040-40274843. While all existing protocols focus on the faults or dishonesty of the cloud. However.  Wang et al. which allows the auditor to verify the integrity of the data in cloud without retrieving the whole data.logicsystems. www. 9533694296 Email id: academicliveprojects@gmail. a critical security problem—the key exposure problem for cloud storage auditing. have proposed an auditing protocol supporting fully dynamic data operations including modification. a thirdparty auditor (TPA) is introduced to help the client to periodically check the integrity of the data in cloud.

in our protocol. How to do it efficiently under this new problem setting brings in many new challenges to be addressed below. ADVANTAGES OF PROPOSED SYSTEM: Contact: 040-40274843. in which the operational complexities of key size. we use a binary tree structure to appoint time periods and associate periods with tree nodes by the pre-order traversal technique. www. Our goal is to design a cloud storage auditing protocol with built-in key-exposure resilience. without retrieving the entire data from the cloud.  Our goal is to design a practical auditing protocol with key-exposure resilience. This is because. applying the traditional solution of key revocation to cloud storage auditing is not practical.in . In each time period.e. First of all. As we will show later.com. i. 9533694296 Email id: academicliveprojects@gmail.. computation overhead and communication overhead should be at most sub-linear to T. the client can audit the integrity of the cloud data still in aggregated manner. The secret key in each time period is organized as a stack. the secret key is updated by a forward-secure technique.org. In order to achieve our goal. the client needs to produce a new pair of public key and secret key and regenerate the authenticators for the client’s data previously stored in cloud. we focus on how to reduce the damage of the clients key exposure in cloud storage auditing.Enabling Cloud Storage Auditing With Key Exposure Resistance PROPOSED SYSTEM:  In this paper.  The auditing protocol achieves key-exposure resilience while satisfying our efficiency requirements. whenever the client’s secret key for auditing is exposed.logicsystems.

In order to achieve our goal. lazy update and multiple sectors. and justify its performance via concrete asymptotic analysis. Contact: 040-40274843. seen in a few previous works on different cryptographic designs.Enabling Cloud Storage Auditing With Key Exposure Resistance  We initiate the first study on how to achieve the key-exposure resilience in the storage auditing protocol and propose a new concept called auditing protocol with key-exposure resilience. 9533694296 Email id: academicliveprojects@gmail. the pre-order traversal technique is used to associate each node of a binary tree with each time period. In addition. Indeed. We also design a novel authenticator supporting the forward security and the property of blockless verifiability. the stack structure is used to realize the pre-order traversal of the binary tree. can all be detected.  We prove the security of our protocol in the formalized security model. We also show that our proposed design can be extended to support the TPA.org. In our detailed protocol.  This very important issue is not addressed before by previous auditing protocol designs. the proposed protocol only adds reasonable overhead to achieve the keyexposure resilience.logicsystems. even if the cloud gets the client’s current secret key for cloud storage auditing.  We design and realize the first practical auditing protocol with built-in keyexposure resilience for cloud storage. Such a binary tree structure can be considered as a variant of the tree structure used in the HIBE scheme. any dishonest behaviors. to update the secret keys of the client.com. In such a protocol. www.in . such as deleting or modifying some client’s data stored in cloud in previous time periods. we employ the binary tree structure. We further formalize the definition and the security model of auditing protocol with key-exposure resilience for secure cloud storage.

www.  Floppy Drive : 1. Contact: 040-40274843.4 GHz.com.Enabling Cloud Storage Auditing With Key Exposure Resistance SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2. 9533694296 Email id: academicliveprojects@gmail.  Hard Disk : 40 GB.44 Mb.org.in .logicsystems.  Monitor : 15 VGA Colour.

4  Database : MYSQL REFERENCE: Jia Yu.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.org. and Vijay Varadharajan.Enabling Cloud Storage Auditing With Key Exposure Resistance  Mouse : Logitech. Kui Ren. IEEE. IEEE. JUNE 2015. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 10. “Enabling Cloud Storage Auditing With KeyExposure Resistance”. NO. IEEE. Cong Wang. Member. 6. Senior Member. Contact: 040-40274843. 9533694296 Email id: academicliveprojects@gmail. www. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7. VOL. Senior Member.in .  Ram : 512 Mb.com.logicsystems.