Abstract
Key-exposure resilient cloud storage auditing can create a secure cloud storage during before and after the key-exposure period. However, the malicious cloud server can still tamper with and even discard the client’s files which are uploaded during the key-exposure period without being detected. So as to cope with this problem, we propose an intrusion-resilient public cloud auditing scheme, in which auditing authenticators are updated periodically to prevent the malicious cloud from tampering with these files using the exposed key. In addition, our scheme is secure unless the client and TPA (Third Party Auditor) are compromised in the same time period. This is different from Yu et al.’s scheme proposed in TIFS 2017, which is not secure if the client and TPA are compromised in different periods. Finally, the scheme can protect the client’s file privacy, and prevent a curious TPA from recovering the file. The security analysis and the results of the experiment indicate that the security and performance of the scheme are acceptable.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.