Title
Intrusion-Resilient Public Auditing Protocol For Data Storage In Cloud Computing
Abstract
Cloud storage auditing is a crucial service that provides integrity checking for clients' data in the cloud server. However, if the client's auditing secret key is exposed, the malicious cloud server can tamper even throw away the client's data without being detected. In this paper, we propose an intrusion-resilient public auditing protocol that can reduce the damage caused by key exposure. In our protocol, the auditing secret key is managed by the client with the help of a third party auditor (TPA), who cannot compute the client's auditing secret key. Our protocol divides the lifetime of file stored on cloud into several time periods, and each time period is further divided into several refreshing periods. We show that our protocol is secure (i.e., backward security and forward security) against the adversary as long as the client and TPA are compromised in different refreshing period. Our protocol still captures the forward security when the client and TPA are compromised in the same refreshing period.
Year
DOI
Venue
2018
10.1007/978-3-319-93638-3_23
INFORMATION SECURITY AND PRIVACY
Keywords
Field
DocType
Key exposure, Intrusion-resilient, Cloud computing, Cloud storage auditing
Audit,Intrusion,Computer security,Computer data storage,Computer science,Third party,Forward secrecy,Adversary,Cloud storage,Cloud computing,Distributed computing
Conference
Volume
ISSN
Citations 
10946
0302-9743
0
PageRank 
References 
Authors
0.34
14
4
Name
Order
Citations
PageRank
Yan Xu1639.97
Ran Ding200.34
Jie Cui36011.46
Hong Zhong420833.15