An examination on data integrity auditing patterns in cloud computing

  • Authors

    • T A.Mohanaprakash
    • J Andrews
    2018-03-01
    https://doi.org/10.14419/ijet.v7i1.9.9822
  • Integrity, Cloud Computing, Cloud Service Suppliers, Third Party Auditor
  • Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.

  • References

    1. [1] J. Meza, Q. Wu, S. Kumar, and O. Mutlu, “A Large-Scale Study of Flash Memory Failures in the Field,†in Proc. SIGMETRICS, pp. 177–190, 2015.

      [2] M. Shahidehpour, Z. Li, S. Bahramirad, Z. Li and W. Tian, "Networked Microgrids: Exploring the Possibilities of the IIT-Bronzeville Grid," in IEEE Power and Energy Magazine, vol. 15, no. 4, pp. 63-71, July-Aug. 2017.

      [3] M. Shahidehpour, Z. Li, S. Bahramirad, Z. Li and W. Tian, "Networked Microgrids: Exploring the Possibilities of the IIT-Bronzeville Grid," in IEEE Power and Energy Magazine, vol. 15, no. 4, pp. 63-71, July-Aug. 2017.

      [4] M. H. Cintuglu; T. Youssef; O. A. Mohammed, "Development and Application of a Real-Time Testbed for Multiagent System Interoperability: A Case Study on Hierarchical Microgrid Control," in IEEE Transactions on Smart Grid, vol.PP, no.99, pp.1-1, 2015.

      [5] M. Shahidehpour, Z. Li, S. Bahramirad, Z. Li and W. Tian, "Networked Microgrids: Exploring the Possibilities of the IIT-Bronzeville Grid," in IEEE Power and Energy Magazine, vol. 15, no. 4, pp. 63-71, July-Aug. 2017.

      [6] R. Duan, R. Prodan, X. Li, "Multi-Objective Game Theoretic Scheduling of Bag-of-Tasks Workflows on Hybrid Clouds [J]", IEEE Trans on Cloud Computing, vol. 2, no. 1, pp. 29-42, 2014.

      [7] D. Takahashi, Y. Xiao, "Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability", Security and Communication Networks, vol. 1, no. 2, pp. 147-160, Feb. 2008.

      [8] A. Devulapalli and P. Wyckoff, "File creation strategies in a distributed metadata file system," Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International, pp. 1-10, 26-30 March 2007.

      [9] Rajesh, M., and J. M. Gnanasekar. "Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks." Wireless Personal Communications 97, no. 1: 1267-1289. (2017)

      [10] K. Hiraga, O. Tatebe, "Design and implemantation of distirbuted metadata server using non-blocking transaction for distributed file system", IPSJ SIG Technical Reports of High Performance Computing (HPC), vol. 2012, no. 28, pp. 1-9, 2012.

      [11] Wei Wang, Lei Chen, Qian Zhang, “Outsourcing high-dimensional healthcrae data to cloud with personalized privacy preservationâ€, Computer Networks, Volume 88, 9, Pages 136–148, 2015.

      [12] K. Vijayakumar C, Arun, Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC,Cluster Computing DOI 10.1007/s10586-017-1176-x,Sept 2017.

      [13] K. Vijayakumar C,Arun, Analysis and selection of risk assessment frameworks for cloud based enterprise applicationsâ€, Biomedical Research, ISSN: 0976-1683 (Electronic), January 2017.

  • Downloads

  • How to Cite

    A.Mohanaprakash, T., & Andrews, J. (2018). An examination on data integrity auditing patterns in cloud computing. International Journal of Engineering & Technology, 7(1.9), 200-204. https://doi.org/10.14419/ijet.v7i1.9.9822