Back to Top

AN ANALYSIS OF THE ROBUST KEY REVEAL MECHANISM USED IN THE PUBLIC AUDIT MODEL FOR SECURE CLOUD STORAGE

Published On: September, 2023

Article Type: Research Article

Journal: INTERNATIONAL JOURNAL OF NOVEL RESEARCH AND DEVELOPMENT

Issue: 9 | Volume: 8 | Page No: c573-c583

pdf

Download full PDF File

Abstract

Cloud storage allows customers to securely store their data remotely and access it using high-quality apps on demand. Data outsourcing is a practice that alleviates users from the burdens associated with data storage and maintenance. By entrusting their large-scale data to cloud platforms, users are relieved of the responsibility of ensuring data integrity, which poses significant challenges. The implementation of public audit for cloud data storage security has significant importance. Individuals have the option to request an external assessment conducted by a third party in order to verify the authenticity and reliability of their externally derived data. Nevertheless, under this particular framework, it is possible for the untrustworthy cloud to potentially generate legitimate authenticators at a later period than the point at which the secret key of the Data Client is revealed, provided that it has acquired such key. This article presents a proposed prototype called Robust Key Revelation for public auditing in secure cloud storage. The objective is to ensure the preservation of cloud storage auditing security both before to and subsequent to the key revelation process. The concept and security model of this novel cloud storage auditing mechanism were formalized, and a specific scheme was devised. The suggested prototype ensures that the security of cloud storage auditing is unaffected by the key reveal in one time period, hence maintaining data integrity across other time periods. The security proof and experimental results provide evidence that the suggested prototype effectively achieves both intended security and efficiency within specified time periods. Keywords: Secure Cloud Storage, Robust Key Revelation, Security, Data Client, and Public Auditing.

Authors

Uploded Document Preview