An Integrated Cuckoo AES Key Generationapproach with Bilinear Pairing to Detect Malicious Third-Party Auditors in the Cloud
Main Article Content
Abstract
To handle huge amounts of data, either a single user or organization are depending
on the cloud environment but security to their data is the major concern that the cloud service
provider has to take care of in the public clouds during the process of outsourcing. So, the
cloud environments have deployed a component known as “Third Party Auditor”, which
verifies the data in the cloud and ensures that the data is not tampered with by the attackers.
While interacting with the public cloud, every user has a period known as the “verification
period”, during which the user can raise the data challenge task to the auditor. In general, the
data uploaded by the user are divided into various blocks or segments. Hence, to verify a
single user data the auditors have to generate multiple integrity reports and should check their
consistency. If TPA detects any inconsistent data, then it has the right to reject the process
and notifies the same user but the major problem is TPA works simultaneously with more
users because of which the verification process becomes a burden to the TPA. If the system is
overloaded with more verification requests then the cost of computing in the cloud increases
and the time to check the data integrity also increases which results in compromise by the
TPA. So, to address this issue many researchers have proposed integrity verification
algorithms but most of them suffer from many design issues like resource allocations, relay
time decisions, and time consumption hence the proposed system has implementeda cuckoo
algorithm integrated with AES to generate the keys and performs bilinear map functions to
repair and audit within an optimal time
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.