Survey on Data Integrity, Recovery, and Proof of Retrievability Techniques in Cloud Storage

  • Authors

    • Neha Narayan Kulkarni
    • Shital Kumar A. Jain
    • . .
    2018-07-04
    https://doi.org/10.14419/ijet.v7i3.6.14938
  • Data integrity, data recovery, proof of retrievability, third party auditor.
  • Recently the technologies are growing fast, so they have become the point of source and also the sink for data. Data is generated in large volume introducing the concept of structured and unstructured data evolving "Big Data" which needs large memory for storage. There are two possible solutions either increase the local storage or use the Cloud Storage. Cloud makes data available to the user anytime, anywhere, anything. Cloud allows the user to store their data virtually without investing much. However, this data is on cloud raising a concern of data security and recovery. This attack is made by the untrusted or unauthorized user remotely. The attacker may modify, delete or replace the data. Therefore, different models are proposed for a data integrity check and proof of retrievability. This paper includes the literature review related to various techniques for data integrity, data recovery and proof of retrievability.

     

     

  • References

    1. [1] Razaque A & Rizvi SS, “Privacy-preserving model: a new scheme for auditing cloud stakeholdersâ€, Journal of Cloud Computing: Advances, Systems and Applications, (2017).

      [2] Kiraz MS, “A comprehensive meta-analysis of cryptographic security mechanisms for cloud computingâ€, Journal of Ambient Intelligence and Humanized Computing, Vol.7, No.5,(2016), pp.731-760.

      [3] Garg N & Bawa S, “Comparative analysis of cloud data integrity auditing protocolsâ€, Journal of Network and Computer Applications, ELSEVIER, Vol.66, (2016), pp.17-32.

      [4] SeviÅŸ KN & Åžeker E, “Survey on Data Integrity in Cloudâ€, IEEE 3rd International Conference on Cyber Security and Cloud Computing, (2016).

      [5] Worku SG, Ting Z & Zhi-Guang Q, “Survey on Cloud Data Integrity Proof Techniquesâ€, Seventh Asia Joint Conference on Information Security Information Security (Asia JCIS), (2012).

      [6] Desai CV & Jethava GB, “Survey on Data Integrity Checking Techniques in Cloud Data Storageâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, No.12, (2014).

      [7] Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y & Min G, “Identity-based remote data integrity checking with perfect data privacy preserving for cloud storageâ€, IEEE Transactions on Information Forensics and Security, Vol.12, No.4, (2017), pp.767-778.

      [8] Yu Y, Xue L, Au MH, Susilo W, Ni J, Zhang Y, Vasilakos AV & Shen J, “Cloud data integrity checking with an identity-based auditing mechanism from RSAâ€, Future Generation Computer Systems, Vol.62, (2016), pp.85-91.

      [9] Liu H, Mu Y, Zhao J, Xu C, Wang H, Chen L & Yu Y, “Identity-based provable data possession revisited: Security analysis and generic constructionâ€, Computer Standards & Interfaces, Vol.54, (2017), pp.10-19.

      [10] Wang H, He D & Tang S, “Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud†IEEE Transactions on Information Forensics and Security, Vol.11, (2016), pp.1165–1176.

      [11] He K, Chen J, Du R, Wu Q, Xue G & Zhang X, “DeyPoS: Deduplicatable dynamic proof of storage for multi-user environmentsâ€, IEEE Transactions on Computers, Vol.65, No.12, (2016), pp.3631-3645.

      [12] Shen W, Yang G, Yu J, Zhang H, Kong F & Hao R, “Remote data possession checking with privacy-preserving authenticators for cloud storageâ€, Future Generation Computer Systems, ELSEVIER, Vol. 76, (2017), pp.136-145.

      [13] Pophale K, Patil P, Shelake R & Sapkal S, “Seed Block Algorithm: Remote Smart Data-Backup Technique for Cloud Computingâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol.4, No.3, (2015).

      [14] Etemad M & Küpçü A, “Generic Efficient Dynamic Proofs of Retrievabilityâ€, Communication of ACM, (2016), pp.85-96.

      [15] Vasilopoulos D, Önen M, Elkhiyaoui K & Molva R, “Message-Locked Proofs of Retrievability with Secure Deduplicationâ€, Communication of ACM, (2016), pp.73-83.

      [16] Hegde RA & Prakash M, “A Survey on Proof of Retrievability and its Techniquesâ€, International Journal of Engineering and Techniques, Vol.2, No.2, (2016).

  • Downloads

  • How to Cite

    Narayan Kulkarni, N., Kumar A. Jain, S., & ., . (2018). Survey on Data Integrity, Recovery, and Proof of Retrievability Techniques in Cloud Storage. International Journal of Engineering & Technology, 7(3.6), 55-58. https://doi.org/10.14419/ijet.v7i3.6.14938