Transparent Cloud Storage Auditing Through Delegated Key Updates

Authors

  • M. Sabari Ramachandran Assistant Professor, Master of Computer Applications, Mohamed Sathak Engineering College, Keelakarai, Tamil Nadu, India
  • M. Keerthana Postgraduate Student, Master of Computer Applications, Mohamed Sathak Engineering College, Keelakarai, Tamil Nadu, India

Keywords:

Cloud storage, Data auditing, Forward security, Homomorphic encryption, Key-exposure resistance, Proxy re-encryption, Third-Party Auditor (TPA), Verifiable key updates

Abstract

Cloud storage services offer scalable solutions for data outsourcing, but ensuring data integrity and key confidentiality during this process remains a significant challenge especially in the face of potential key exposure. Traditional methods that rely on frequent client-side key updates increase computational overhead and user burden, particularly for resource-constrained devices. This paper presents a novel cloud storage auditing framework that addresses these challenges through verifiable outsourcing of key updates. In the proposed model, a trusted Third-Party Auditor (TPA) manages encrypted secret keys on behalf of clients and performs both auditing and key update operations without compromising data privacy. Clients are required to decrypt their secret keys only when uploading new files, thus minimizing local processing. The system also allows clients to verify the validity of the encrypted keys received from the TPA, providing enhanced assurance against tampering. Security analysis and performance simulations demonstrate the protocol’s effectiveness in offering forward security, mitigating retrospective attacks, and reducing user-side complexity. The architecture supports secure, efficient, and transparent cloud storage auditing, making it suitable for mobile and low-power environments.

References

Juels and B. S. Kaliski Jr, “PORs: Proofs of retrievability for large files,” in Proc. 14th ACM Conf. Computer and Communications Security, Oct. 28, 2007, pp. 584–597, doi: https://doi.org/10.1145/1315245.1315317

C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, Feb. 2013, doi: https://doi.org/10.1109/TC.2011.245

J. Yu, K. Ren, and C. Wang, “Enabling cloud storage auditing with verifiable outsourcing of key updates,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1362–1375, Jun. 2016, doi: https://doi.org/10.1109/TIFS.2016.2528500

A. Fatima and S. D. Pingle, "Enabling storage auditing in a cloud of key updates from verifiable outsource," Journal of Emerging Technologies and Innovative Research, vol. 9, no. 9, pp. a476–a482, Sep. 2022. Available: https://www.jetir.org/papers/JETIR2209049.pdf

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Computer and Communications Security, Oct. 28, 2007, pp. 598–609, doi: https://doi.org/10.1145/1315245.1315318

M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep online storage services honest,” in Proc. HotOS, May 2007. Available: https://www.usenix.org/legacy/events/hotos07/tech/full_papers/shah/shah.pdf?ref=https://githubhelp.com

H. Shacham and B. Waters, “Compact proofs of retrievability,” Journal of Cryptology, vol. 26, no. 3, pp. 442–483, Jul. 2013, doi: https://doi.org/10.1007/s00145-012-9129-2

C. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” ACM Transactions on Information and System Security (TISSEC), vol. 17, no. 4, pp. 1–29, Apr. 2015, doi: https://doi.org/10.1145/2699909

R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple-replica provable data possession,” in Proc. 28th Int. Conf. Distributed Computing Systems (ICDCS), Jun. 17, 2008, pp. 411–420, doi: https://doi.org/10.1109/ICDCS.2008.68

D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” Journal of Cryptology, vol. 17, pp. 297–319, Sep. 2004, doi: https://doi.org/10.1007/s00145-004-0314-9

S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Proc. Int. Conf. Financial Cryptography and Data Security, Springer, Jan. 25, 2010, pp. 136–149. doi: https://doi.org/10.1007/978-3-642-14992-4_13

C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220–232, May 2011, doi: https://doi.org/10.1109/TSC.2011.24

B. Wang, B. Li, and H. Li, “Panda: Public auditing for shared data with efficient user revocation in the cloud,” IEEE Transactions on Services Computing, vol. 8, no. 1, pp. 92–106, Jan.–Feb. 2015, doi: https://doi.org/10.1109/TSC.2013.2295611

K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, Jan.–Feb. 2012, doi: https://doi.org/10.1109/MIC.2012.14

K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability: Theory and implementation,” in Proc. 2009 ACM Workshop on Cloud Computing Security, Nov. 13, 2009, pp. 43–54. doi: https://doi.org/10.1145/1655008.1655015

Published

2025-07-25