An examination on data integrity auditing patterns in cloud computing

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


  • Keywords


    Integrity; Cloud Computing; Cloud Service Suppliers; Third Party Auditor

  • References


      [1] J. Meza, Q. Wu, S. Kumar, and O. Mutlu, “A Large-Scale Study of Flash Memory Failures in the Field,” in Proc. SIGMETRICS, pp. 177–190, 2015.

      [2] M. Shahidehpour, Z. Li, S. Bahramirad, Z. Li and W. Tian, "Networked Microgrids: Exploring the Possibilities of the IIT-Bronzeville Grid," in IEEE Power and Energy Magazine, vol. 15, no. 4, pp. 63-71, July-Aug. 2017.

      [3] M. Shahidehpour, Z. Li, S. Bahramirad, Z. Li and W. Tian, "Networked Microgrids: Exploring the Possibilities of the IIT-Bronzeville Grid," in IEEE Power and Energy Magazine, vol. 15, no. 4, pp. 63-71, July-Aug. 2017.

      [4] M. H. Cintuglu; T. Youssef; O. A. Mohammed, "Development and Application of a Real-Time Testbed for Multiagent System Interoperability: A Case Study on Hierarchical Microgrid Control," in IEEE Transactions on Smart Grid, vol.PP, no.99, pp.1-1, 2015.

      [5] M. Shahidehpour, Z. Li, S. Bahramirad, Z. Li and W. Tian, "Networked Microgrids: Exploring the Possibilities of the IIT-Bronzeville Grid," in IEEE Power and Energy Magazine, vol. 15, no. 4, pp. 63-71, July-Aug. 2017.

      [6] R. Duan, R. Prodan, X. Li, "Multi-Objective Game Theoretic Scheduling of Bag-of-Tasks Workflows on Hybrid Clouds [J]", IEEE Trans on Cloud Computing, vol. 2, no. 1, pp. 29-42, 2014.

      [7] D. Takahashi, Y. Xiao, "Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability", Security and Communication Networks, vol. 1, no. 2, pp. 147-160, Feb. 2008.

      [8] A. Devulapalli and P. Wyckoff, "File creation strategies in a distributed metadata file system," Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International, pp. 1-10, 26-30 March 2007.

      [9] Rajesh, M., and J. M. Gnanasekar. "Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks." Wireless Personal Communications 97, no. 1: 1267-1289. (2017)

      [10] K. Hiraga, O. Tatebe, "Design and implemantation of distirbuted metadata server using non-blocking transaction for distributed file system", IPSJ SIG Technical Reports of High Performance Computing (HPC), vol. 2012, no. 28, pp. 1-9, 2012.

      [11] Wei Wang, Lei Chen, Qian Zhang, “Outsourcing high-dimensional healthcrae data to cloud with personalized privacy preservation”, Computer Networks, Volume 88, 9, Pages 136–148, 2015.

      [12] K. Vijayakumar C, Arun, Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC,Cluster Computing DOI 10.1007/s10586-017-1176-x,Sept 2017.

      [13] K. Vijayakumar C,Arun, Analysis and selection of risk assessment frameworks for cloud based enterprise applications”, Biomedical Research, ISSN: 0976-1683 (Electronic), January 2017.


 

View

Download

Article ID: 9822
 
DOI: 10.14419/ijet.v7i1.9.9822




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.