Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Public Audit for Cloud Computing Environment: A Review

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Tejashri A. Patil, Ashish T. Bhole
10.5120/ijca2017913372

Tejashri A Patil and Ashish T Bhole. Public Audit for Cloud Computing Environment: A Review. International Journal of Computer Applications 162(7):5-9, March 2017. BibTeX

@article{10.5120/ijca2017913372,
	author = {Tejashri A. Patil and Ashish T. Bhole},
	title = {Public Audit for Cloud Computing Environment: A Review},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {162},
	number = {7},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {5-9},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume162/number7/27253-2017913372},
	doi = {10.5120/ijca2017913372},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The cloud computing in its various form allow users to store information at remote location and reduce load at local system. Even though it is an advantage still drawback exists such as remote storage. The major security issues in cloud computing such as lack of data control, lack of trust and multi-tenancy are reviewed. The cloud computing and its service and deployment models are discussed by ways which the present security issues in cloud computing are prevented. Ensuring cloud data integrity and privacy seems to be the major issue. To overcome unauthorized access of data by cloud service providers and data users, verification is performed through trusted third party auditor. The cloud auditing needs to be performed and data security also needs to be ensured without the knowledge of the actual data stores at cloud. Researcher shows keen interest to provide a cloud framework, which preserves the privacy and ensures the integrity of cloud data. The paper reviews privacy preserving public audit schemes in cloud computing environment.

References

  1. Sookhak, Mehdi, Abdullah Gani, Muhammad Khurram Khan, and Rajkumar Buyya. "Dynamic remote data auditing for securing big data storage in cloud computing." Information Sciences 380 (2017): 101-116
  2. Kim, Daeyeong, Hyunsoo Kwon, Changhee Hahn, and Junbeom Hur. "Privacy-preserving public auditing for educational multimedia data in cloud computing." Multimedia Tools and Applications 75, no. 21 (2016): 13077-13091
  3. Ateniese, Giuseppe, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. "Scalable and efficient provable data possession." In Proceedings of the 4th international conference on Security and privacy in communication netowrks, p. 9. ACM, 2008
  4. Shimbre, Nivedita, and Priya Deshpande. "Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm." In Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on, pp. 35-39. IEEE, 2015
  5. Cao, Ning, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. "Privacy-preserving multi-keyword ranked search over encrypted cloud data." IEEE Transactions on parallel and distributed systems 25, no. 1 (2014): 222-233
  6. Lordemann, David, Daniel Robinson, and Paul Scheibe. "Method and system for establishing an audit trail to protect objects distributed over a network." U.S. Patent Application 09/952,696, filed September 14, 2001
  7. Yang, Kan, and Xiaohua Jia. "An efficient and secure dynamic auditing protocol for data storage in cloud computing." IEEE transactions on parallel and distributed systems 24, no. 9 (2013): 1717-1726
  8. Li, Ling, Lin Xu, Jing Li, and Changchun Zhang. "Study on the third-party audit in cloud storage service." In Cloud and Service Computing (CSC), 2011 International Conference on, pp. 220-227. IEEE, 2011
  9. Yu, Yong, Lei Niu, Guomin Yang, Yi Mu, and Willy Susilo. "On the security of auditing mechanisms for secure cloud storage." Future Generation Computer Systems 30 (2014): 127-132
  10. Yang, Guangyang, Jia Yu, Wenting Shen, Qianqian Su, Zhangjie Fu, and Rong Hao. "Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability." Journal of Systems and Software 113 (2016): 130-139
  11. Wang, Cong, Qian Wang, Kui Ren, and Wenjing Lou. "Privacy-preserving public auditing for data storage security in cloud computing." In Infocom, 2010 proceedings IEEE, pp. 1-9. IEEE, 2010
  12. Yuchuan, Luo, Fu Shaojing, Xu Ming, and Wang Dongsheng. "Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage." China Communications 11, no. 11 (2014): 114-124
  13. Navajothi, R., and S. Jean Adrien Fenelon. "An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage." In Information Communication and Embedded Systems (ICICES), 2014 International Conference on, pp. 1-6. IEEE, 2014
  14. Cong Wang, Qian Wang, Kui Ren, Ning Cao and Wenjing, (2012) ―Towared secure and Dependable storage service in cloud computing, IEEE
  15. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, ―Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility, Fut. Gener. Comput. Syst., pp. 599–616, 2009

Keywords

Cloud environment, cloud computing, audit, trust, security