A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage
نویسندگان
چکیده
Cloud storage service, which enables users to store the data in the remote cloud and to access to it over the Internet regardless of location and time, is an important development trend in information technologies. This cloud storage provides on-demand high quality storage and computing resources, but it also introduces new security challenges. Thus, an auditing service is desired to convince users that their data are correctly stored in the cloud. In this paper, we present a survey of remote auditing schemes in the literature. We explain the concept of remote data auditing, and then describe system model and taxonomy of remote data auditing schemes, especially focusing on provable data possession schemes which support public auditability and batch verification. We review seven batch auditing schemes and compare them in terms of their features and performance. Finally, we introduce some challenging issues in the design of efficient batch auditing.
منابع مشابه
Proving Possession and Retrievability within a Cloud Environment: A Comparative Survey
Outsourcing data to a remote Cloud Service Provider (CSP) is a growing trend for numerous organizations alleviating the burden of local data storage and maintenance. While Cloud computing makes these advantages more appealing than ever, it also brings new challenging security threats towards user’s outsourced data. It’s of crucial importance to customers to have strong evidence that they actual...
متن کاملDynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Cloud storage services have become accessible and used by everyone. Nevertheless, stored data are dependable on the behavior of the cloud servers, and losses and damages often occur. One solution is to regularly audit the cloud servers in order to check the integrity of the stored data. The Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy presented in ACISP’15 ...
متن کاملPrivacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code
Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...
متن کاملOn the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage
Provable Data Possession (PDP) enables cloud users to verify the integrity of their outsourced data without retrieving the entire file from cloud servers. At present, to execute data checking, many PDP schemes is delegated to some proxy to implement remote data possession checking task. Because the proxy may store some state information in cloud storage servers, it makes that many PDP scheme ar...
متن کاملProvable Data Possession Scheme based on Homomorphic Hash Function in Cloud Storage
Cloud storage can satisfy the demand of accessing data at anytime, anyplace. In cloud storage, only when the users can verify that the cloud storage server possesses the data correctly, users shall feel relax to use cloud storage. Provable data possession(PDP) makes it easy for a third party to verify whether the data is integrity in the cloud storage server. We analyze the existing PDP schemes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 5 شماره
صفحات -
تاریخ انتشار 2015