Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Review on Privacy Preserving Public Auditing for Data Sharing on Cloud

Print
PDF
IJCA Proceedings on National Conference on Advances in Computing
© 2015 by IJCA Journal
NCAC 2015 - Number 3
Year of Publication: 2015
Authors:
Dipali R. Sakhare
Arti Mohanpurkar

Dipali R Sakhare and Arti Mohanpurkar. Article: Review on Privacy Preserving Public Auditing for Data Sharing on Cloud. IJCA Proceedings on National Conference on Advances in Computing NCAC 2015(3):42-46, December 2015. Full text available. BibTeX

@article{key:article,
	author = {Dipali R. Sakhare and Arti Mohanpurkar},
	title = {Article: Review on Privacy Preserving Public Auditing for Data Sharing on Cloud},
	journal = {IJCA Proceedings on National Conference on Advances in Computing},
	year = {2015},
	volume = {NCAC 2015},
	number = {3},
	pages = {42-46},
	month = {December},
	note = {Full text available}
}

Abstract

There numerous data integrity checking techniques have been projected in purpose of privacy preserving cloud data. Most of mechanisms assume that only the data owner can modify data stored on cloud. There are various techniques have been projected intended for data integrity auditing which focuses on various practical features to have user’s confidence of the integrity of their cloud shares data. To check auditing various features considered like the dynamic data support, public auditing, low communication or computational audit cost, low storage overhead. In recent times a very few attempts consider extra realistic scenarios through allowing several cloud users to modify data with integrity assurance. On the other hand, these attempts are still away from practical owing to the tremendous estimation on cloud users. This paper intend a new integrity auditing technique intended for cloud data sharing services represented by multi-user updating, public integrity auditing, high error detection probability, efficient user revocation as well as Unauthorised user access detection. Also this paper addresses review on different techniques use for integrity check and privacy preservation.

References

  • J. Yuan and S. Yu, 2015. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification. IEEE Transactions on Information Forensics and Security Volume: 10.
  • A. Juels and B. S. Kaliski, Jr., 2007. Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. Alexandria, Virginia, USA: ACM.
  • G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. 2007 Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. Alexandria, Virginia, USA:ACM.
  • G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik. 2008 Scalable and efficient provable data possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, ser. SecureComm ’08. New York, NY, USA: ACM.
  • H. Shacham and B. Waters. 2008 Compact proofs of retrievability. In Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology.
  • C. Wang, Q. Wang, K. Ren, and W. Lou 2009 Ensuring data storage security in cloud computing. In Proceedings of the 17th IEEE International Workshop on Quality of Service.
  • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. 2009 Enabling public verifiability and data dynamics for storage security in cloud computing. In Proceedings of the 14th European conference on Researching computer security, Saint-Malo, France.
  • C. Wang, Q. Wang, K. Ren, and W. Lou 2010 Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 29th IEEE International Conference on Computer Communications, California, USA.
  • Y. Zhu, H.Wang, Z. Hu, G. J. Ahn, H. Hu, and S. S. Yau. 2011 Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceedings of the 2011 ACM Symposium on Applied Computing, ser. SAC ’11. New York, NY, USA: ACM.
  • B. Wang, B. Li, and H. Li 2012 Oruta: Privacy-preserving public auditing for shared data in the cloud. In Proceedings of the IEEE Fifth International Conference on Cloud Computing, ser. CLOUD’12, Washington, DC, USA.
  • J. Yuan and S. Yu. 2013 Proofs of Retrievability with public verifiability and constant communication cost in cloud. In Proceedings of the International Workshop on Security in Cloud Computing, ser. Cloud Computing ’13. Hangzhou, China: ACM.
  • A. De Caro and V. Iovino. 2011 jpbc: Java pairing based cryptography. In Proceedings of the 16th IEEE Symposium on Computers and Communications.
  • J. Yuan and S. Yu. 2013 Secure and constant cost public cloud storage auditing with deduplication. In Proceedings of the 1st IEEE Conference on Communications and Network Security, ser. CNS’13, Washington, USA.
  • D. Boneh, B. Lynn, and H. Shacham. 2001 Short signatures from the weil pairing. In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology.
  • C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou 2013 Privacy preserving public auditing for secure cloud storage,” IEEE Transactions on Computers.
  • J. Yuan and S. Yu. 2013 Proofs of retrievability with public verifiability and constant communication cost in cloud. In Proceedings of the International Workshop on Security in Cloud Computing, ser. Cloud Computing ’13. Hangzhou, China: ACM.