{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T09:10:00Z","timestamp":1762938600228,"version":"3.45.0"},"reference-count":39,"publisher":"Wiley","issue":"25-26","license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2025,11,30]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Ensuring data confidentiality and integrity in dynamic cloud storage environments is a growing challenge, particularly in the face of key exposure threats. Traditional key management schemes, which rely on periodic updates, introduce significant vulnerabilities due to long windows of exposure between key rotations. Also, it often requires high computational overhead from re\u2010encrypting entire datasets during key updates and frequently depends on third\u2010party auditors for integrity verification, which can compromise privacy. However, a major research gap remains in developing a scalable, efficient, and auditor\u2010free key management protocol that can adapt in real time to evolving cloud access patterns. In this paper, we propose a novel Dynamic Event\u2010Driven Key Regeneration System that leverages Elliptic Curve Diffie\u2010Hellman (ECDH) for secure key exchange and Advanced Encryption Standard\u2014Galois\/Counter Mode (AES\u2010GCM) for combined encryption and integrity verification. Unlike conventional time\u2010 or session\u2010based strategies, the proposed design uses statistically adaptive thresholding derived from real\u2010time file access patterns to enable on\u2010demand key regeneration and selective re\u2010encryption, drastically reducing computational overhead. By re\u2010encrypting only affected files, the system is optimized for large\u2010scale, multi\u2010tenant cloud environments. Furthermore, the proposed approach eliminates the need for external auditors, as integrity verification is performed internally via cryptographic mechanisms, ensuring both privacy and security. Experimental results show that the proposed system achieves an average key generation time of 2.3\u2009ms, encryption latency of just 0.21\u2009s for 100\u2009MB files, and key regeneration times as low as 0.0012\u20130.0350\u2009s, outperforming existing approaches by up to 80% in computational efficiency. The system scales efficiently in multi\u2010tenant environments, maintaining low overhead with up to 100 users and providing near\u2010linear performance even with 1000 concurrent encryption operations. These results demonstrate that the proposed adaptive, event\u2010driven system offers enhanced protection against key exposure while maintaining low overhead, making it a viable and secure solution for modern cloud infrastructures.<\/jats:p>","DOI":"10.1002\/cpe.70329","type":"journal-article","created":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T23:45:06Z","timestamp":1759448706000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Event\u2010Driven Key Management for Securing Cloud Data Against Key Exposure"],"prefix":"10.1002","volume":"37","author":[{"given":"Atul Kumar","family":"Singh","sequence":"first","affiliation":[{"name":"National Institute of Technology  Kurukshetra India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4106-1278","authenticated-orcid":false,"given":"Kriti","family":"Bhushan","sequence":"additional","affiliation":[{"name":"National Institute of Technology  Kurukshetra India"}]}],"member":"311","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"e_1_2_12_2_1","unstructured":"T.Singleton \u201cWhy Are So Many Enterprises Moving to the Cloud?\u201d(2018) Datometry Blog."},{"key":"e_1_2_12_3_1","unstructured":"T.NiklandR. K.Chintalapudi \u201c8 Common Reasons Why Enterprises Migrate to the Cloud \u201d(2018) Google Cloud Blog."},{"key":"e_1_2_12_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"e_1_2_12_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.127584"},{"key":"e_1_2_12_6_1","doi-asserted-by":"publisher","DOI":"10.4015\/S1016237224500601"},{"key":"e_1_2_12_7_1","doi-asserted-by":"publisher","DOI":"10.26421\/QIC24.3-4-3"},{"key":"e_1_2_12_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400425"},{"key":"e_1_2_12_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_2_12_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_2_12_11_1","first-page":"104","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO)","author":"Kocher P. C.","year":"1996"},{"key":"e_1_2_12_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_21"},{"key":"e_1_2_12_13_1","doi-asserted-by":"crossref","unstructured":"S.JanaandV.Shmatikov \u201cMemento: Learning Secrets From Process Footprints \u201d(2012) in 2012 IEEE Symposium on Security and Privacy IEEE 143\u2013157.","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_2_12_14_1","unstructured":"M.VuagnouxandS.Pasini \u201cCompromising Electromagnetic Emanations of Wired and Wireless Keyboards \u201d(2009) proceedings for the 2009 USENIX Security Symposium Montreal Canada 1\u201316."},{"issue":"2","key":"e_1_2_12_15_1","first-page":"1","article-title":"A Public Auditing Protocol for Cloud Storage System With Intrusion\u2010Resilience","volume":"13","author":"Ding R.","year":"2019","journal-title":"IEEE Systems Journal"},{"key":"e_1_2_12_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2528500"},{"key":"e_1_2_12_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.1"},{"key":"e_1_2_12_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2587242"},{"key":"e_1_2_12_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2998462"},{"key":"e_1_2_12_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.06.043"},{"issue":"2","key":"e_1_2_12_21_1","first-page":"1118","article-title":"Efficient Certificateless Multi\u2010Copy Integrity Auditing Scheme Supporting Data Dynamics","volume":"19","author":"Zhou L.","year":"2022","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"e_1_2_12_22_1","first-page":"1","article-title":"Strong Key\u2010Exposure Resilient Auditing for Secure Cloud Storage","volume":"11","author":"Yu J.","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"e_1_2_12_23_1","first-page":"1","article-title":"Fuzzy Identity\u2010Based Data Integrity Auditing for Reliable Cloud Storage Systems","volume":"14","author":"Li Y.","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"e_1_2_12_24_1","first-page":"826","article-title":"Data Integrity Auditing Without Private Key Storage for Secure Cloud Storage","volume":"8","author":"Shen W.","year":"2018","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_2_12_25_1","first-page":"30","article-title":"Identity\u2010Based Key\u2010Exposure Resilient Cloud Storage Public Auditing Scheme From Lattices","volume":"520","author":"Zhang X.","year":"2018","journal-title":"Information Sciences"},{"issue":"1","key":"e_1_2_12_26_1","first-page":"28","article-title":"Securing Cloud Data Under Key Exposure","volume":"6","author":"Karame G. O.","year":"2018","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_2_12_27_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4838497"},{"key":"e_1_2_12_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.010"},{"key":"e_1_2_12_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3228699"},{"key":"e_1_2_12_30_1","doi-asserted-by":"publisher","DOI":"10.53106\/160792642023112406009"},{"key":"e_1_2_12_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104943"},{"key":"e_1_2_12_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3351119"},{"issue":"1","key":"e_1_2_12_33_1","first-page":"142","article-title":"Securing Cloud Data Under Key Exposure Innovative Techniques for Robust Data Protection","volume":"10","author":"Rao D. K.","year":"2024","journal-title":"Macaw International Journal of Advanced Research in Computer Science and Engineering"},{"key":"e_1_2_12_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103798"},{"key":"e_1_2_12_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.107716"},{"key":"e_1_2_12_36_1","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.8523"},{"issue":"2","key":"e_1_2_12_37_1","first-page":"635","article-title":"Safeguarding Privacy by Utilizing SC\u2010D\u2113DA Algorithm in Cloud\u2010Enabled Multi\u2010Party Computation","volume":"19","author":"Dhinakaran D.","year":"2025","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"15","key":"e_1_2_12_38_1","first-page":"1","article-title":"The Key Security Management Scheme of Cloud Storage Based on Blockchain and Digital Twins","volume":"13","author":"Huang J.","year":"2024","journal-title":"Journal of Cloud Computing: Advances, Systems and Applications"},{"issue":"1","key":"e_1_2_12_39_1","first-page":"1","article-title":"Collaborative Cybersecurity Using Blockchain: A Survey","volume":"1","author":"Miller L.","year":"2024","journal-title":"ACM Computing Surveys"},{"key":"e_1_2_12_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14051019"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.70329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T09:05:08Z","timestamp":1762938308000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.70329"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"references-count":39,"journal-issue":{"issue":"25-26","published-print":{"date-parts":[[2025,11,30]]}},"alternative-id":["10.1002\/cpe.70329"],"URL":"https:\/\/doi.org\/10.1002\/cpe.70329","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2025,10,2]]},"assertion":[{"value":"2025-05-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70329"}}