A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing

نویسندگان

  • Chi-Wei Liu
  • Wei-Fu Hsien
  • Chou Chen Yang
  • Min-Shiang Hwang
چکیده

Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage services bring a lot of convenience, many enterprises and users store the data to the cloud storage. However, the user will outsource data to the cloud storage service, but the user is difficult to manage remote data in the cloud. Therefore, how users verify data integrity is a major challenge. In recent years, public audit is used to verify data integrity by which the user allows other to verify the user’s data. Because the feature of cloud service allows users to communicate with each other on the cloud platform, the cloud storage service allows the data owner to share their data to other users. Therefore, public auditing extends to the share data, so the original operation becomes not the same including signature, public audits, dynamic data and user revocation which generates on the situation of shared data. In the paper, we define the requirements of public auditing with shared data and explain four representative approaches which include analysis function, security, and performance requirements. Finally, we provide some topics for future research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Integrity Auditing with Homomorphic Encryption for Dynamic Cloud with Group user Revocation

With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. Recently, some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. An efficient public integrity auditing with a secur...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Guest Editorial for Special Section on Advanced Techniques for Efficient and Reliable Cloud Storage

CLOUD computing has emerged as a disruptive technology andnew computing paradigm inwhich IT resources (hardware, software, applications, data storage, computing capacity, etc.) are provided as services over the Internet, through “everything-as-a-service”. It builds on the foundations of distributed computing, grid computing, virtualization, service orientation, etc. Cloud storage, which is one ...

متن کامل

Record Maintenance and Secure Preserving Of Shared Data in Public Auditing

Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...

متن کامل

Privacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code

Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016