2020
DOI: 10.1155/2020/4838497
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience

Abstract: Secured storage system is a critical component in cloud computing. Cloud clients use cloud auditing schemes to verify the integrity of data stored in the cloud. But with the exposure of the auditing secret key to the Cloud Service Provider, cloud auditing becomes unsuccessful, however strong the auditing schemes may be. Therefore, it is essential to prevent the exposure of auditing secret keys, and even if it happens, it is necessary to minimize the damage caused. The existing cloud auditing schemes that are s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(24 citation statements)
references
References 23 publications
0
24
0
Order By: Relevance
“…select the example of this priority to process (6) update l and y i ; ( 7) else (8) for u ⟶ 1 in queue do (9) if u in l then (10) u is selected to process (11) update l and y i ; (12) break; (13 Based on our model M/G/k/l-P, we can see that the waiting time is relatively small when applying a suitable number of servers, which influences the performance of the queuing model. Meanwhile, it can monitor the waiting time under different number of servers to dynamically adjust the number for queuing model.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…select the example of this priority to process (6) update l and y i ; ( 7) else (8) for u ⟶ 1 in queue do (9) if u in l then (10) u is selected to process (11) update l and y i ; (12) break; (13 Based on our model M/G/k/l-P, we can see that the waiting time is relatively small when applying a suitable number of servers, which influences the performance of the queuing model. Meanwhile, it can monitor the waiting time under different number of servers to dynamically adjust the number for queuing model.…”
Section: Resultsmentioning
confidence: 99%
“…en, the mean waiting time of M/M/k model can be predicted so we can obtain the mean waiting time for all tasks of W M/M/k in formula (11). ρ M/M/k � λ/kμ; M means Markov that tasks arrive according to Poisson process.…”
Section: M/g/k/l-p Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The audit key exposure issue is handled in some of the PDP schemes (Public Key Infrastructure (PKI-) based schemes and Identity-based schemes) for single cloud storage. In these schemes, the audit key evolves over time i.e., the lifetime of the data file is partitioned into time periods and the audit key is updated at the beginning of time periods [8][9][10][11][12][13][14][15]. Some of these schemes are secure in the preceding time periods of the exposed key (forward security).…”
Section: Auditingmentioning
confidence: 99%
“…These schemes still face the key-management problem. The Identity-based key-insulated scheme [15] is both forward and backward secure. In this scheme, the audit key is updated together by both the key updating server and the client.…”
Section: Auditingmentioning
confidence: 99%