Securing cloud data under key exposure

GO Karame, C Soriente, K Lichota… - … on Cloud Computing, 2017 - ieeexplore.ieee.org
… assumption of key exposure, and propose a new security definition that captures this notion.
… a multi-cloud storage system which can leverage a number of commodity cloud providers (…

[PDF][PDF] A Survey of: Securing Cloud Data under Key Exposure

G Amrulla, M Mourya, RR Sanikommu… - International Journal of …, 2018 - academia.edu
data confidentiality even if the encryption key is leaked and the adversary has access to almost
all cipher text blocks. We analyze the security ofkey exposure in cloud storage auditing. …

Securing Cloud Data under Key Exposure

A Hussain - IIRJET, 2018 - iirjet.org
… file in the cloud while encrypting the data, but the hackers , whose know the key they hack
that file very easily, so we provide a bastion algorithm, Bastion first encrypts the data with one …

Strong key-exposure resilient auditing for secure cloud storage

J Yu, H Wang - IEEE Transactions on Information Forensics …, 2017 - ieeexplore.ieee.org
… the key exposure problem in cloud storage auditing. We propose a new paradigm called
strong key-exposure resilient auditing scheme for secure cloud storage. In this paradigm, the …

Enabling cloud storage auditing with key-exposure resistance

J Yu, K Ren, C Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… of cloud storage auditing. We investigate how to reduce the damage of the client’s key
exposure in cloud storage … We show an auditing system for secure cloud storage in Fig. 1. The …

[PDF][PDF] Securing Cloud Data Under Key Exposure

P Jagadeesan, K Mohan, V Naveen, AM Farmaanullah - 2024 - easychair.org
… In response to this pressing challenge, we introduce Bastion, a pioneering and efficient
solution designed to protect data privacy even in the event of key exposure and an attacker's …

A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance

S Xu, G Yang, Y Mu, X Liu - Future Generation Computer Systems, 2019 - Elsevier
… Our proposed system can efficiently deal with both secret key revocation for corrupted
users and accidental decryption key exposure for honest users. We analyze the security of our …

Enabling Cloud Data Service Security with Key Exposure.

P Arala, V Gayatri, Y Jahnavi - Indian Journal of Public …, 2019 - search.ebscohost.com
data over the Internet. In this paper, to build a cost-effective and secure data sharing system
in cloud computing… accessing previously shared data, as well as subsequently shared data. …

[PDF][PDF] Securing Cloud Data under Key Exposure

KN Reddy, MS Maheboob, M AbdulRasool - mlsoft.in
… We consider a multi-cloud storage system which can leverage a number of commodity cloud
providers (eg, … This “cloud of clouds” model is receiving increasing attention now a days with …

[PDF][PDF] Enabling Cloud Storage Auditing with Key Exposure Resistance

MD RAVIKUMAR, HA PATEL, RAJJ BHAVANI… - 2022 - academia.edu
… impact of a client's major exposure in cloud storage audits in this article. Our goal is to
develop a cloud storage auditing methodology that incorporates key-exposure resilience. How to …