A Comprehensive Survey on Public Auditing for Secure Cloud Storage

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cloud computing is the most popular paradigms used today by Industries & individual users to store data. This outsourcing releases user from capital as well as maintenance cost to own their data. But it brings new security challenges such as data integrity & privacy since user has no power of control on his own data. Advances in encryption & authentication techniques has improved security of data at cloud server(CS) but still it is not providing any certificate or assurance about cloud data to user. Most of the times users are not aware of the different controls employed by CS to protect integrity of data. Due to this lack of transparency in system, the user may lose trust on CS. Hence it is a need of user to check integrity of his data at regular intervals. Most of the researchers have given solutions to this problem with the help of cryptography techniques. External parties such as Third-Party Auditors (TPA) are performing audit to verify this remote data on behalf of user. This paper surveys different cryptography mechanisms proposed by different researchers to check integrity of remote data. Finally, we address future research challenges that need to be resolved by researchers to make system more transparent.

     

     



  • Keywords


    Aggregate Signature; Cloud Computing; Data dynamics; Homomorphic Authenticators; Public Auditing; Ring Signature; Shared data.

  • References


      [1] Q. Wang, C. Wang, K. Ren, W. Lou & J. Li (May 2011). Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel and Distributed Systems, 22(5),847-859,

      [2] C. Wang, Sherman S. –M. Chow, Q. Wang, K. Ren &W. Lou (Feb 2013). PrivacyPreserving Public Auditing for Secure Cloud Storage” IEEETrans. On Computer, 62(2).

      [3] Boyang Wang, Baochun Li &Hui Li. (March 2014).Oruta:Privacy-Preserving Public Auditing for Shared Data in the Cloud. IEEE Trans. On cloud Computing,2(1).

      [4] Boyang Wang, Baochun Li &Hui Li.(February 2015).Panda:Public Auditing for Shared data with Efficient User Revocation in the Cloud.IEEE trans. ServicesComputing, 8(1).

      [5] Hui Tian, Y. Chen, C. Chang, H. Jiang, Y. Huang, Y. Chen, Jin Liu, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Strage”, IEEE Transactins on Service Computing, Vol.10, PP. 701-714, December 2015

      [6] T. Chakraborty,Anil Dhami, P. Bansal, Tripti Singh, “Enhanced Public Auditability & Secure Data Storage in cloud computing”, IACC IEEE Inter. Conf., 2013

      [7] Sumathi D., R. V. Pujeri, “A Modified Elliiptic Curve Digital Signature Algorithm for Public Verifiability With Data Dynamics in Cloud Computing”, Journal of computer Science, Vol. 10,PP.2077-2087, 2014

      [8] Salah H. Abbdal, Hai Jin, Ali Yassin, Zaid A, M. Abdulridha H.,Zaid Alaa H., Deqing Zou, “An Efficient Public Verifiablity and Data Integrity using Multiple TPAs in Cloud Data Storage”, IEEE 2nd International Conference on Big Data Security-HPSC-IDS, 2016

      [9] A. Juels, B. Kaliski, Jr., “ Pors; Proofs of Retrievability for Large Files”, Proc, 14th ACM Conf. Computer and Comm. Security(CCS’07), PP.584-597, 2007

      [10] G. Ateniese R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores”, Proc, 14th ACM Conf. Computer and Comm. Security(CCS’07), PP.598-609, 2007

      [11] M Blaze, G. Bleumer & M.Strauss. (1998). Divertible Protocols and Atomic Proxy Cryptography.Proc. Int’l Conf. Theory and application of Cryptographic Techniques (EUROCRYPT’98).

      [12] P. Mell &T. Grance, (2009). Draft NIST Working Definition of Cloud Computing.

      [13] C. Wang, K. Ren, W. Lou &Jin Li (August 2010). Toward Publicly Auditable Secure Cloud Data Storage Services.IEEE Network.

      [14] D. Boneh, C. Gentry, B. Lynnand& H. Shacham. Aggregate and Verifiablly Encrypted Signatures from Bilinear Maps.Proc. 22nd Int’l Conf. Theory and application of Cryptographic Techniques (EUROCRYPT’03).

      [15] Boyang Wang, Sherman S. M., Ming Li &Hui Li. (July 2013).Storing Shared Data on the cloud via Security-Mediator.Proc. IEEE 33rd Int’l Conf. Distributed Computing Systems (ICDCS’13).

      [16] ANNABATTULA, J., KOTESWARA RAO, S., SAMPATH DAKSHINA MURTHY, A., SRIKANTH, K.S. and DAS, R.P., 2015. Underwater passive target tracking in constrained environment. Indian Journal of Science and Technology, 8(35), pp. 1-4.

      [17] HUSSAIN, S.N. and KISHORE, K.H., 2016. Computational Optimization of Placement and Routing using Genetic Algorithm. Indian Journal of Science and Technology, 9(47),.

      [18] Vudatha, C.P., Nalliboena, S., Jammalamadaka, S.K.R., Duvvuri, B.K.K., Reddy, L.S.S., Automated generation of test cases from output domain of an embedded system using Genetic algorithms, ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology 5,5941989, pp. 216-220"

      [19] Sastry, J.K.R., Suresh, A., Bhanu, S.J., Building heterogeneous distributed embedded systems through rs485 communication protocol, ARPN Journal of Engineering and Applied Sciences, 2015, 10(16), pp. 6793-6803


 

View

Download

Article ID: 10883
 
DOI: 10.14419/ijet.v7i2.7.10883




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.