A Comprehensive Survey on Public Auditing for Secure Cloud Storage

  • Authors

    • Smita Chaudhari
    • Siva Kumar Pathuri
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10883
  • Aggregate Signature, Cloud Computing, Data dynamics, Homomorphic Authenticators, Public Auditing, Ring Signature, Shared data.
  • Cloud computing is the most popular paradigms used today by Industries & individual users to store data. This outsourcing releases user from capital as well as maintenance cost to own their data. But it brings new security challenges such as data integrity & privacy since user has no power of control on his own data. Advances in encryption & authentication techniques has improved security of data at cloud server(CS) but still it is not providing any certificate or assurance about cloud data to user. Most of the times users are not aware of the different controls employed by CS to protect integrity of data. Due to this lack of transparency in system, the user may lose trust on CS. Hence it is a need of user to check integrity of his data at regular intervals. Most of the researchers have given solutions to this problem with the help of cryptography techniques. External parties such as Third-Party Auditors (TPA) are performing audit to verify this remote data on behalf of user. This paper surveys different cryptography mechanisms proposed by different researchers to check integrity of remote data. Finally, we address future research challenges that need to be resolved by researchers to make system more transparent.

     

     


  • References

    1. [1] Q. Wang, C. Wang, K. Ren, W. Lou & J. Li (May 2011). Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel and Distributed Systems, 22(5),847-859,

      [2] C. Wang, Sherman S. –M. Chow, Q. Wang, K. Ren &W. Lou (Feb 2013). PrivacyPreserving Public Auditing for Secure Cloud Storage†IEEETrans. On Computer, 62(2).

      [3] Boyang Wang, Baochun Li &Hui Li. (March 2014).Oruta:Privacy-Preserving Public Auditing for Shared Data in the Cloud. IEEE Trans. On cloud Computing,2(1).

      [4] Boyang Wang, Baochun Li &Hui Li.(February 2015).Panda:Public Auditing for Shared data with Efficient User Revocation in the Cloud.IEEE trans. ServicesComputing, 8(1).

      [5] Hui Tian, Y. Chen, C. Chang, H. Jiang, Y. Huang, Y. Chen, Jin Liu, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Strageâ€, IEEE Transactins on Service Computing, Vol.10, PP. 701-714, December 2015

      [6] T. Chakraborty,Anil Dhami, P. Bansal, Tripti Singh, “Enhanced Public Auditability & Secure Data Storage in cloud computingâ€, IACC IEEE Inter. Conf., 2013

      [7] Sumathi D., R. V. Pujeri, “A Modified Elliiptic Curve Digital Signature Algorithm for Public Verifiability With Data Dynamics in Cloud Computingâ€, Journal of computer Science, Vol. 10,PP.2077-2087, 2014

      [8] Salah H. Abbdal, Hai Jin, Ali Yassin, Zaid A, M. Abdulridha H.,Zaid Alaa H., Deqing Zou, “An Efficient Public Verifiablity and Data Integrity using Multiple TPAs in Cloud Data Storageâ€, IEEE 2nd International Conference on Big Data Security-HPSC-IDS, 2016

      [9] A. Juels, B. Kaliski, Jr., “ Pors; Proofs of Retrievability for Large Filesâ€, Proc, 14th ACM Conf. Computer and Comm. Security(CCS’07), PP.584-597, 2007

      [10] G. Ateniese R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Storesâ€, Proc, 14th ACM Conf. Computer and Comm. Security(CCS’07), PP.598-609, 2007

      [11] M Blaze, G. Bleumer & M.Strauss. (1998). Divertible Protocols and Atomic Proxy Cryptography.Proc. Int’l Conf. Theory and application of Cryptographic Techniques (EUROCRYPT’98).

      [12] P. Mell &T. Grance, (2009). Draft NIST Working Definition of Cloud Computing.

      [13] C. Wang, K. Ren, W. Lou &Jin Li (August 2010). Toward Publicly Auditable Secure Cloud Data Storage Services.IEEE Network.

      [14] D. Boneh, C. Gentry, B. Lynnand& H. Shacham. Aggregate and Verifiablly Encrypted Signatures from Bilinear Maps.Proc. 22nd Int’l Conf. Theory and application of Cryptographic Techniques (EUROCRYPT’03).

      [15] Boyang Wang, Sherman S. M., Ming Li &Hui Li. (July 2013).Storing Shared Data on the cloud via Security-Mediator.Proc. IEEE 33rd Int’l Conf. Distributed Computing Systems (ICDCS’13).

      [16] ANNABATTULA, J., KOTESWARA RAO, S., SAMPATH DAKSHINA MURTHY, A., SRIKANTH, K.S. and DAS, R.P., 2015. Underwater passive target tracking in constrained environment. Indian Journal of Science and Technology, 8(35), pp. 1-4.

      [17] HUSSAIN, S.N. and KISHORE, K.H., 2016. Computational Optimization of Placement and Routing using Genetic Algorithm. Indian Journal of Science and Technology, 9(47),.

      [18] Vudatha, C.P., Nalliboena, S., Jammalamadaka, S.K.R., Duvvuri, B.K.K., Reddy, L.S.S., Automated generation of test cases from output domain of an embedded system using Genetic algorithms, ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology 5,5941989, pp. 216-220"

      [19] Sastry, J.K.R., Suresh, A., Bhanu, S.J., Building heterogeneous distributed embedded systems through rs485 communication protocol, ARPN Journal of Engineering and Applied Sciences, 2015, 10(16), pp. 6793-6803

  • Downloads

  • How to Cite

    Chaudhari, S., & Kumar Pathuri, S. (2018). A Comprehensive Survey on Public Auditing for Secure Cloud Storage. International Journal of Engineering & Technology, 7(2.7), 565-569. https://doi.org/10.14419/ijet.v7i2.7.10883