Cloud data integrity checking methods: a survey
-
2019-02-15 https://doi.org/10.14419/ijet.v7i4.23667 -
Auditing Protocols, Cloud Computing, Cloud Storage, Data Integrity, Third -Party Auditor, -
Abstract
Cloud computing is an internet- based computing which provides different services to its users on demand. The users can keep their data in the cloud server without maintaining a native copy. The integrity of the data outsourced can be ensured using various data integrity checking methods. This paper discusses the pros and cons of various techniques for checking data integrity, along with future directions to researchers. The major concern of the data integrity checking methods is the computational load of auditors.
Â
-
References
[1] Yuan Zhang et al., “Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscationâ€, IEEE Transactions of Information Forensics and Security, vol.12, no.3, pp. 676 – 688, March 2017.
[2] Yong Yu, Yannan Li, Bo Yang, Willey Susilo et al., “Attribute-based Cloud Data Integrity Auditing for Secure Outsourced Storageâ€, IEEE Transactions on Emerging Topics in Computing,vol. 14, no.8, pp. 1-13, October 2017.
[3] Y. Yu, M. H. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, G.Min. “Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storageâ€. IEEE Trans. Information Forensics and Security vol.12, no.4, pp.767-778, April 2017.
[4] H. Q.Wang. “Identity-Based Distributed Provable Data Possession Multicloud Storageâ€. IEEE Transactions on Services Computing vol. 8, no.2, pp.328-340, April 2015.
[5] Huaqun Wang, Debiao He and Shaohua Tang, “Identity – Based Proxy Oriented Data Uploading and Remote Data Integrity Checking in Public Cloudâ€, IEEE Transactions of Information Forensics and Security, vol.11, no.6, pp. 1165 – 1176, June 2016.
[6] Yong Yu, Jianbing Ni, Man Ho Au, Yi Mu, Boyang Wang and Hui Li, “Comments on a Public Auditing Mechanism for Shared Cloud Data Serviceâ€, IEEE Transactions on Services Computing, vol. 8, no.6, pp. 998 -999, November/ December 2015.
[7] Y. Yu, M.H. Au, Y. Mu, S.H. Tang, J. Ren, W. Susilo and L.J. Dong. “Enhanced privacy of a remote data integrity-checking protocol for secure cloud storageâ€. International Journal of Information Security., vol. 14, no. 4, pp.307-318, 2015.
[8] .Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian and Zheming Dong, Privacy-Preserving Public Auditing Protocol for Low Performance End Devices in Cloud, IEEE Transactions on Information Forensics and Security vol.11, no.11, pp:2572-2583, November 2016.
[9] Cong Wang, S. M. Chow,Qian Wang, Kui Ren and Wenjing Lou, “Privacy – Preserving Public Auditing for Secure Cloud Storageâ€, IEEE Transactions on Computers, vol. 62, no. 2, pp. 362 – 375, February 2013.
[10] Y. Zhang, J. Ni, X., Y. Wang, and Y. Yu. “Provable multiple replicationdata possession with full dynamics for secure cloud storageâ€. Concurrency and Computation: Practice and Experience, vol. 28, no.4, pp.1161- 1173, June 2016.
[11] Kumar Parasuraman, P. Srinivasababu, S.Rajula., and T.Arumuga Maria Devi, “Secured Document Management through A Third Party Auditor Scheme in Cloud Computingâ€, in International Conference Electronics, Communication and Computational Engineering, pp.109 – 118, IEEE 2014.
[12] Sophia Yakoubov, Vijay Gadepally, Nabil Schear, Emily Shen and ArkadyYerukhimovich, “A Survey of Cryptographic Approaches to Securing Big-Data Analytics in the Cloudâ€, High Performance Extreme Computing Conference 2014 IEEE.
[13] Y. Yu, J.B. Ni, M. H. Au, H.Y. Liu, H.Wang and C.X. Xu. “Improved security of a dynamic remote data possession checking protocol for cloud storageâ€. Expert Syst. Appl.vol. 41, no. 17, pp.7789-7796, June 2014.
[14] Erway C C, Kupcu A, Papamanthou C, et al. “Dynamic provable data possessionâ€. ACM Transactions on Information and System Security (TISSEC), vol. 17, no. 4, April 2015.
[15] Ari Juels and Burton S Kaliski, “Pors: proofs of retrievability for large filesâ€, Proceedings of the 14th ACM conference on CCS, pp. 583 – 597, 2007.
[16] G. Ateniese et al., “Provable Data Possession at Untrusted storesâ€, inProc.CCS, pp.598 – 609, 2007.
[17] Y. Deswarte, J.J Quisquarter and A Saidane, “Remote Integrity Checkingâ€, Integrity and Internal Control in Information Systems VI. Springer US, pp 1-11,2004.
[18] Yindong Chen, Liping Li, Ziran Chen, “An approach to Verifying Data Integrity for Cloud Storageâ€, 13th International Conference on Computational Intelligence and Security, pp, 582-585, IEEE 2017.
[19] K Chida, G. Yamamoto, “Batch Processing of Interactive Proofsâ€, Cryptographers Track at the RSA Conference, Springer Berlin Heidelberg, San Fransisco, USA, 2007, pp. 196-207.
[20] Kan Yang and Xiaohua Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computingâ€, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no.9, pp. 1717-1726, September 2013.
[21] Zhifeng Xiao and Yang Xiao, “Security and Privacy in Cloud Computingâ€, IEEE Communications Surveys & Tutorials, vol.15, no.2, pp. 843 – 859, 2013.
[22] Sultan Aldossary and William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutionsâ€, International Journal of Advanced Computer Science and Applications, vol.7, no.4, pp. 485 –498, 2016.
[23] Curtmola R, Khan O, Burns RC, G. Ateniese, “MR-PDP: Multiple – Replica Provable Data Possessionâ€, Proceedings of ICDCS’08, Beijing, pp. 411-420, June 2008.
[24] Barsoum AF and Hasan MA, “Integrity Verification of Multiple Data Copies Over Untrusted Cloud Serversâ€, Proceedings of CCGRID’12, Ottawa, pp. 829 – 834, May 2012.
-
Downloads
-
How to Cite
George, A., & Shajin Nargunam, A. (2019). Cloud data integrity checking methods: a survey. International Journal of Engineering & Technology, 7(4), 4791-4794. https://doi.org/10.14419/ijet.v7i4.23667Received date: 2018-12-11
Accepted date: 2019-01-13
Published date: 2019-02-15