首页    期刊浏览 2024年11月07日 星期四
登录注册

文章基本信息

  • 标题:IDENTITY-BASED REMOTE DATA CHECKING ANALYSIS ON CLOUD STORAGE WITH STRONG KEY-EXPOSURE RESILIENCE
  • 本地全文:下载
  • 作者:K. Lalitha Naga Durga ; K.Parish Venkata Kumar ; MD. Farhath Ayesha
  • 期刊名称:International Journal of Early Childhood Special Education
  • 电子版ISSN:1308-5581
  • 出版年度:2022
  • 卷号:14
  • 期号:2
  • 页码:6191-6194
  • DOI:10.9756/INT-JECSE/V14I2.708
  • 语种:English
  • 出版社:International Journal of Early Childhood Special Education
  • 摘要:Private auditing and public auditing are the two most common types of traditional remote data possession auditing systems. Informally, only the original data owner can check the integrity of its outsourced data in private auditing, but everyone can do so in public auditing. Existing private and public auditing techniques do not satisfy the need for a single designated verifier in many real-world circumstances. Existing cloud auditing solutions rely on Public Key Infrastructure (PKI) and hence face certificate management and verification issues. In addition, these techniques require a lot of computing time to verify the integrity of data blocks. The damage caused by key disclosure in identity-based schemes is restricted to the time period immediately before the key's exposure, even though certificates are no longer required. Several of the most important exposure-resistant approaches don't support batch auditing. This study proposes an identity-based proof of data possession technique. With this feature, identity-based cloud storage auditing's security is protected in both pre- and post-exposure phases. Additionally, batch auditing is supported. Using this strategy, the Cloud Service Provider's replacement assault is thwarted, data privacy is protected against the Third-Party Auditor, and the correctness of the data is effectively verified.
  • 关键词:Private auditing and public auditing are the two most common types of traditional remote data possession auditing systems
国家哲学社会科学文献中心版权所有