首页    期刊浏览 2025年02月18日 星期二
登录注册

文章基本信息

  • 标题:Dynamic Proof of Storage (POS)
  • 本地全文:下载
  • 作者:C. Swetha ; Dr Jammi Ashok
  • 期刊名称:International Journal of Computer Trends and Technology
  • 电子版ISSN:2231-2803
  • 出版年度:2017
  • 卷号:52
  • 期号:1
  • 页码:17-21
  • DOI:10.14445/22312803/IJCTT-V52P105
  • 出版社:Seventh Sense Research Group
  • 摘要:Keybetrayal perpetually has always been an critical issue for indepth cyber defence in lots of protection programs. Recently, the way to prearrangement with the important thing publicity trouble within the settings of cloud garage auditing has been contemplated and studied. To cope with the project, current answers all require the consumer to update his secret keys in whenever period, which may additionally inevitably bring in new neighborhood hindrance to the purchaser, mainly people with constrained computation resources, such as cell phones. In this paper, we cynosure on the way to make the key updates as transparent as feasible for the customer and recommend a new paradigm referred to as cloud garage auditing with verifiable outsourcing of key updates. In this paradigm, key updates may be competently outsourced to a few legal birthday celebration, and hence the important thingreplace burden at the purchaser could be kept minimum. In precise, we leverage the 0.33 party auditor (TPA) in many present public auditing designs, let it play the role of authorized celebration in our case, and make it in fee of each the garage auditing and the comfy key updates for keypublicity resistance. In our layout, TPA simplest desires to hold an encrypted version of the client’s secret key at the same time as doing a lot of these burdensome obligations on behalf of the customer. The customer handiest needs to download the encrypted secret key from the TPA while uploading new files to cloud. Besides, our design also equips the client with functionality to in addition verify the validity of the encrypted mystery keys furnished by the TPA. All these salient capabilities are cautiously designed to make the whole auditing system with key exposure resistance as obvious as viable for the purchaser. We formalize the definition and the safety version of this paradigm. The safety evidence and the performance simulation display that our targeted design instantiations are relaxed and efficient.
  • 关键词:TPA; Cloud Computing; Client
国家哲学社会科学文献中心版权所有