Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Data Integrity Auditing of Cloud Storage

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Wale Amol D., Vedant Rastogi
10.5120/ijca2016908177

Wale Amol D. and Vedant Rastogi. Article: Data Integrity Auditing of Cloud Storage. International Journal of Computer Applications 133(17):17-21, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Wale Amol D. and Vedant Rastogi},
	title = {Article: Data Integrity Auditing of Cloud Storage},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {17},
	pages = {17-21},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Cloud servers is a platform for enabling convenient, on demand network access to a shared pool of configurable server resources (memory, networks, storage, cpu, applications, and services) that can be rapidly provisioned and released with minimal management effort or cloud service provider interactions. Cloud servers are mostly being used; however, data security is one of the major barriers to adoption in cloud storage. Users can store data and used on demand or for the applications without keeping any local copy of the data on there machine. The Cloud servers storage technologies offers the promise of massive cost savings combined with increased IT agility due to pay per consume. However, this technology challenges many traditional approaches to hosting provider and enterprise application design and management. Users can able to upload data on cloud storage without worrying about to check or verify the integrity. Hence integrity auditing for cloud data is more important task to ensure users data integrity. To do this user can resort the TPA (Third Party Auditor) to check the data on the cloud storage is not violating the integrity. TPA is the expertise and having good knowledge and capabilities which users can not able to check. TPA audit the integrity of all files stored on the cloud storage on behalf of the users and inform the results. Users should consider the auditing process will not cause new vulnerability against the users valuable and confidential data also ensures integrity auditing will not cause any resources problem.

References

  1. Cong Wang ,Sherman S.M Chow, Qian Wang, Kui Ren and wening Lou, “Privacy-Preserving Public Auditing for Secure cloud storage” in IEEE transaction on computers vol 62 No 2 February 2013.
  2. Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou “Toward Secure and Dependable Storage Services in Cloud Computing” IEEE Transaction on Services Computing vol 5 No 2 April-June 2012..
  3. Qian Wang, Cong Wang, Kui Ren , Wenjing Lou And Jin Li “ Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing" IEEE transaction Paper on Parallel and Distributed Systems vol 22 No 5, pp. 847-859, May 2011.
  4. Kan Yang and Xiaohua Jia “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing” IEEE transaction on parallel distributed system, Vol 24 No 9 September 2013.
  5. Yan Zhu, Hongxin Hu, Gail-Joon Ahn and mengyang Yu “Cooperative Provable Data possession for Integrity Verification in Multicloud Storage.” IEEE Transactions on parallel and distributed system, Vol 23, No. 12, pp. 2231-2244,December 2012.
  6. Shucheng Yu, C. Wang, K. Ren, and Wenjing Lou, “Achieving secure, scalable, and fine-grained access control in cloud computing,” in Proc. of IEEE NFOCOM’10, San Diego, CA, USA, March 2010.
  7. Cloud Security Alliance, “Security guidance for critical areas of focus in cloud computing,” 2009, http://www.cloudsecurityalliance.org.
  8. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted Stores,” in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 598–609.
  9. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09, volume 5789 of LNCS. Springer-Verlag, Sep. 2009, pp. 355–370.
  10. A. Juels and J. Burton S. Kaliski, “Pors: Proofs of retrievability or large files,” in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 584–597.
  11. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107.
  12. M. A. Shah, M. Baker, J. C. Mogul, and R.Swaminathan, “Auditing to keep online storage services honest,” in Proc. Of HotOS’07. Berkeley, CA, USA: USENIX Association, 2007, pp.1–6.
  13. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep.
  14. P. Mell and T. Grance, “Draft NIST working definition of cloud computing,” Referenced on June. 3rd, 2009 Online at http://csrc.nist.gov/groups/SNS/ cloud-computing/index.html 2009.

Keywords

Auditing, Cloud, Cloud servers, Data integrity, Data privacy, Security, Storage