Survey on Data Integrity, Recovery, and Proof of Retrievability Techniques in Cloud Storage
Keywords:Data integrity, data recovery, proof of retrievability, third party auditor.
Recently the technologies are growing fast, so they have become the point of source and also the sink for data. Data is generated in large volume introducing the concept of structured and unstructured data evolving "Big Data" which needs large memory for storage. There are two possible solutions either increase the local storage or use the Cloud Storage. Cloud makes data available to the user anytime, anywhere, anything. Cloud allows the user to store their data virtually without investing much. However, this data is on cloud raising a concern of data security and recovery. This attack is made by the untrusted or unauthorized user remotely. The attacker may modify, delete or replace the data. Therefore, different models are proposed for a data integrity check and proof of retrievability. This paper includes the literature review related to various techniques for data integrity, data recovery and proof of retrievability.
 Razaque A & Rizvi SS, â€œPrivacy-preserving model: a new scheme for auditing cloud stakeholdersâ€, Journal of Cloud Computing: Advances, Systems and Applications, (2017).
 Kiraz MS, â€œA comprehensive meta-analysis of cryptographic security mechanisms for cloud computingâ€, Journal of Ambient Intelligence and Humanized Computing, Vol.7, No.5,(2016), pp.731-760.
 Garg N & Bawa S, â€œComparative analysis of cloud data integrity auditing protocolsâ€, Journal of Network and Computer Applications, ELSEVIER, Vol.66, (2016), pp.17-32.
 SeviÅŸ KN & Åžeker E, â€œSurvey on Data Integrity in Cloudâ€, IEEE 3rd International Conference on Cyber Security and Cloud Computing, (2016).
 Worku SG, Ting Z & Zhi-Guang Q, â€œSurvey on Cloud Data Integrity Proof Techniquesâ€, Seventh Asia Joint Conference on Information Security Information Security (Asia JCIS), (2012).
 Desai CV & Jethava GB, â€œSurvey on Data Integrity Checking Techniques in Cloud Data Storageâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, No.12, (2014).
 Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y & Min G, â€œIdentity-based remote data integrity checking with perfect data privacy preserving for cloud storageâ€, IEEE Transactions on Information Forensics and Security, Vol.12, No.4, (2017), pp.767-778.
 Yu Y, Xue L, Au MH, Susilo W, Ni J, Zhang Y, Vasilakos AV & Shen J, â€œCloud data integrity checking with an identity-based auditing mechanism from RSAâ€, Future Generation Computer Systems, Vol.62, (2016), pp.85-91.
 Liu H, Mu Y, Zhao J, Xu C, Wang H, Chen L & Yu Y, â€œIdentity-based provable data possession revisited: Security analysis and generic constructionâ€, Computer Standards & Interfaces, Vol.54, (2017), pp.10-19.
 Wang H, He D & Tang S, â€œIdentity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloudâ€ IEEE Transactions on Information Forensics and Security, Vol.11, (2016), pp.1165â€“1176.
 He K, Chen J, Du R, Wu Q, Xue G & Zhang X, â€œDeyPoS: Deduplicatable dynamic proof of storage for multi-user environmentsâ€, IEEE Transactions on Computers, Vol.65, No.12, (2016), pp.3631-3645.
 Shen W, Yang G, Yu J, Zhang H, Kong F & Hao R, â€œRemote data possession checking with privacy-preserving authenticators for cloud storageâ€, Future Generation Computer Systems, ELSEVIER, Vol. 76, (2017), pp.136-145.
 Pophale K, Patil P, Shelake R & Sapkal S, â€œSeed Block Algorithm: Remote Smart Data-Backup Technique for Cloud Computingâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol.4, No.3, (2015).
 Etemad M & KÃ¼pÃ§Ã¼ A, â€œGeneric Efficient Dynamic Proofs of Retrievabilityâ€, Communication of ACM, (2016), pp.85-96.
 Vasilopoulos D, Ã–nen M, Elkhiyaoui K & Molva R, â€œMessage-Locked Proofs of Retrievability with Secure Deduplicationâ€, Communication of ACM, (2016), pp.73-83.
 Hegde RA & Prakash M, â€œA Survey on Proof of Retrievability and its Techniquesâ€, International Journal of Engineering and Techniques, Vol.2, No.2, (2016).
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).