2019
DOI: 10.22266/ijies2019.0630.06
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Cloud Storage Auditing Based on the Diffie-Hellman Key Exchange

Abstract: Cloud storage auditing technique helps to verify the data integrity in the cloud on behalf of the user. Earlier researcher proposed many techniques on the cloud auditing, but it still lags in computational overhead for the resource constraint users. In this research, the Diffie-Hellman method is used to exchange the key in the Third Party Auditor (TPA) to improve the performance of the auditing method. The key is generated in the third party auditor and this is shared with the user as an encrypted key. The Dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Generally, the cloud storage auditing method is utilized for verifying data integrity in cloud. Such that, [27] exploited Diffie Hellman technique for exchanging the key in TPA for improvising the auditing performance. Further, the generated key in third-party auditor is shared as encrypted key within user.…”
Section: Encryption and Decryptionmentioning
confidence: 99%
“…Generally, the cloud storage auditing method is utilized for verifying data integrity in cloud. Such that, [27] exploited Diffie Hellman technique for exchanging the key in TPA for improvising the auditing performance. Further, the generated key in third-party auditor is shared as encrypted key within user.…”
Section: Encryption and Decryptionmentioning
confidence: 99%
“…Rokesh Kumar Yarava and Rajendra Prasad Singh [20] have presented secure and efficient cloud storage auditing based on the Diffie-hellman key exchange. The approach of Diffie-Hellman generate the key which was in the encrypted form and share those encrypted key in between the two parties such as the sender and destination.…”
Section: Related Workmentioning
confidence: 99%
“…In Ref. [20], a key exchange mechanism for effective encryption of data is proposed, but the technique does not concentrate on access control. The system in Ref.…”
Section: Related Workmentioning
confidence: 99%