Survey on Data Integrity, Recovery, and Proof of Retrievability Techniques in Cloud Storage

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Recently the technologies are growing fast, so they have become the point of source and also the sink for data. Data is generated in large volume introducing the concept of structured and unstructured data evolving "Big Data" which needs large memory for storage. There are two possible solutions either increase the local storage or use the Cloud Storage. Cloud makes data available to the user anytime, anywhere, anything. Cloud allows the user to store their data virtually without investing much. However, this data is on cloud raising a concern of data security and recovery. This attack is made by the untrusted or unauthorized user remotely. The attacker may modify, delete or replace the data. Therefore, different models are proposed for a data integrity check and proof of retrievability. This paper includes the literature review related to various techniques for data integrity, data recovery and proof of retrievability.

     

     


  • Keywords


    Data integrity, data recovery, proof of retrievability, third party auditor.

  • References


      [1] Razaque A & Rizvi SS, “Privacy-preserving model: a new scheme for auditing cloud stakeholders”, Journal of Cloud Computing: Advances, Systems and Applications, (2017).

      [2] Kiraz MS, “A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing”, Journal of Ambient Intelligence and Humanized Computing, Vol.7, No.5,(2016), pp.731-760.

      [3] Garg N & Bawa S, “Comparative analysis of cloud data integrity auditing protocols”, Journal of Network and Computer Applications, ELSEVIER, Vol.66, (2016), pp.17-32.

      [4] Seviş KN & Şeker E, “Survey on Data Integrity in Cloud”, IEEE 3rd International Conference on Cyber Security and Cloud Computing, (2016).

      [5] Worku SG, Ting Z & Zhi-Guang Q, “Survey on Cloud Data Integrity Proof Techniques”, Seventh Asia Joint Conference on Information Security Information Security (Asia JCIS), (2012).

      [6] Desai CV & Jethava GB, “Survey on Data Integrity Checking Techniques in Cloud Data Storage”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, No.12, (2014).

      [7] Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y & Min G, “Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage”, IEEE Transactions on Information Forensics and Security, Vol.12, No.4, (2017), pp.767-778.

      [8] Yu Y, Xue L, Au MH, Susilo W, Ni J, Zhang Y, Vasilakos AV & Shen J, “Cloud data integrity checking with an identity-based auditing mechanism from RSA”, Future Generation Computer Systems, Vol.62, (2016), pp.85-91.

      [9] Liu H, Mu Y, Zhao J, Xu C, Wang H, Chen L & Yu Y, “Identity-based provable data possession revisited: Security analysis and generic construction”, Computer Standards & Interfaces, Vol.54, (2017), pp.10-19.

      [10] Wang H, He D & Tang S, “Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud” IEEE Transactions on Information Forensics and Security, Vol.11, (2016), pp.1165–1176.

      [11] He K, Chen J, Du R, Wu Q, Xue G & Zhang X, “DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments”, IEEE Transactions on Computers, Vol.65, No.12, (2016), pp.3631-3645.

      [12] Shen W, Yang G, Yu J, Zhang H, Kong F & Hao R, “Remote data possession checking with privacy-preserving authenticators for cloud storage”, Future Generation Computer Systems, ELSEVIER, Vol. 76, (2017), pp.136-145.

      [13] Pophale K, Patil P, Shelake R & Sapkal S, “Seed Block Algorithm: Remote Smart Data-Backup Technique for Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.4, No.3, (2015).

      [14] Etemad M & Küpçü A, “Generic Efficient Dynamic Proofs of Retrievability”, Communication of ACM, (2016), pp.85-96.

      [15] Vasilopoulos D, Önen M, Elkhiyaoui K & Molva R, “Message-Locked Proofs of Retrievability with Secure Deduplication”, Communication of ACM, (2016), pp.73-83.

      [16] Hegde RA & Prakash M, “A Survey on Proof of Retrievability and its Techniques”, International Journal of Engineering and Techniques, Vol.2, No.2, (2016).


 

View

Download

Article ID: 14938
 
DOI: 10.14419/ijet.v7i3.6.14938




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.