A Survey of Public Auditing for Secure Data Storage in Cloud Computing
نویسندگان
چکیده
Cloud computing has been popular as the IT architecture. Cloud service providers offer many services based on cloud computing. Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users. However, cloud storage service may have data security because the users’ data is not stored in their own storage. In this paper, we will focus on data integrity in the cloud storage service. Public auditability is a model of outsourcing data integrity verification, which can achieve efficiency and security. Therefore, we survey the previous researches of data integrity based on public auditability which includes collecting the basic requirements and evaluation metrics, providing the representative with approaches to analyze security and efficiency. Finally, we propose some future developments.
منابع مشابه
Secure and efficient privacy-preserving public auditing scheme for cloud storage
Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacypreserving public auditing for secure cloud the storage” is inefficient. Thus, they offered a secure and efficient-privacy public auditing scheme for cloud storage. They claimed that their system is p...
متن کاملPublic Auditing For Secure Cloud Storage with HLA
Cloud computing is internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a very challenging and potentially formidable task, especially for users with constrained computing resources a...
متن کاملRecord Maintenance and Secure Preserving Of Shared Data in Public Auditing
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...
متن کاملPrivacy-Preserving Public Auditing for Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...
متن کاملPrivacy-Preserving Public Auditing for Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...
متن کاملPrivacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code
Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016