On this page
Research Article | Open Access
Volume 14 2022 | None
IDENTITY-BASED REMOTE DATA CHECKING ANALYSIS ON CLOUD STORAGE WITH STRONG KEY-EXPOSURE RESILIENCE
Dr.K.Parish Venkata Kumar MD. Farhath Ayesha MD. Zarina Qhamar Jahan
Pages: 6191-6194
Abstract
Private auditing and public auditing are the two most common types of traditional remote data possession auditing systems. Informally, only the original data owner can check the integrity of its outsourced data in private auditing, but everyone can do so in public auditing. Existing private and public auditing techniques do not satisfy the need for a single designated verifier in many real-world circumstances. Existing cloud auditing solutions rely on Public Key Infrastructure (PKI) and hence face certificate management and verification issues. In addition, these techniques require a lot of computing time to verify the integrity of data blocks. The damage caused by key disclosure in identity-based schemes is restricted to the time period immediately before the key's exposure, even though certificates are no longer required. Several of the most important exposure-resistant approaches don't support batch auditing. This study proposes an identity-based proof of data possession technique. With this feature, identity-based cloud storage auditing's security is protected in both pre- and postexposure phases. Additionally, batch auditing is supported. Using this strategy, the Cloud Service Provider's replacement assault is thwarted, data privacy is protected against the Third-Party Auditor, and the correctness of the data is effectively verified.
Keywords
.
PDF
46
Views
9
Downloads