CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Review on Privacy Preserving Public Auditing for Data Sharing on Cloud

Published on December 2015 by Dipali R. Sakhare, Arti Mohanpurkar
National Conference on Advances in Computing
Foundation of Computer Science USA
NCAC2015 - Number 3
December 2015
Authors: Dipali R. Sakhare, Arti Mohanpurkar
ef7e69fd-09e5-4077-9cc5-6fc2baf3c33c

Dipali R. Sakhare, Arti Mohanpurkar . Review on Privacy Preserving Public Auditing for Data Sharing on Cloud. National Conference on Advances in Computing. NCAC2015, 3 (December 2015), 42-46.

@article{
author = { Dipali R. Sakhare, Arti Mohanpurkar },
title = { Review on Privacy Preserving Public Auditing for Data Sharing on Cloud },
journal = { National Conference on Advances in Computing },
issue_date = { December 2015 },
volume = { NCAC2015 },
number = { 3 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 42-46 },
numpages = 5,
url = { /proceedings/ncac2015/number3/23741-5037/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing
%A Dipali R. Sakhare
%A Arti Mohanpurkar
%T Review on Privacy Preserving Public Auditing for Data Sharing on Cloud
%J National Conference on Advances in Computing
%@ 0975-8887
%V NCAC2015
%N 3
%P 42-46
%D 2015
%I International Journal of Computer Applications
Abstract

There numerous data integrity checking techniques have been projected in purpose of privacy preserving cloud data. Most of mechanisms assume that only the data owner can modify data stored on cloud. There are various techniques have been projected intended for data integrity auditing which focuses on various practical features to have user’s confidence of the integrity of their cloud shares data. To check auditing various features considered like the dynamic data support, public auditing, low communication or computational audit cost, low storage overhead. In recent times a very few attempts consider extra realistic scenarios through allowing several cloud users to modify data with integrity assurance. On the other hand, these attempts are still away from practical owing to the tremendous estimation on cloud users. This paper intend a new integrity auditing technique intended for cloud data sharing services represented by multi-user updating, public integrity auditing, high error detection probability, efficient user revocation as well as Unauthorised user access detection. Also this paper addresses review on different techniques use for integrity check and privacy preservation.

References
  1. J. Yuan and S. Yu, 2015. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification. IEEE Transactions on Information Forensics and Security Volume: 10.
  2. A. Juels and B. S. Kaliski, Jr., 2007. Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. Alexandria, Virginia, USA: ACM.
  3. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. 2007 Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. Alexandria, Virginia, USA:ACM.
  4. G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik. 2008 Scalable and efficient provable data possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, ser. SecureComm ’08. New York, NY, USA: ACM.
  5. H. Shacham and B. Waters. 2008 Compact proofs of retrievability. In Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology.
  6. C. Wang, Q. Wang, K. Ren, and W. Lou 2009 Ensuring data storage security in cloud computing. In Proceedings of the 17th IEEE International Workshop on Quality of Service.
  7. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. 2009 Enabling public verifiability and data dynamics for storage security in cloud computing. In Proceedings of the 14th European conference on Researching computer security, Saint-Malo, France.
  8. C. Wang, Q. Wang, K. Ren, and W. Lou 2010 Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 29th IEEE International Conference on Computer Communications, California, USA.
  9. Y. Zhu, H.Wang, Z. Hu, G. J. Ahn, H. Hu, and S. S. Yau. 2011 Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceedings of the 2011 ACM Symposium on Applied Computing, ser. SAC ’11. New York, NY, USA: ACM.
  10. B. Wang, B. Li, and H. Li 2012 Oruta: Privacy-preserving public auditing for shared data in the cloud. In Proceedings of the IEEE Fifth International Conference on Cloud Computing, ser. CLOUD’12, Washington, DC, USA.
  11. J. Yuan and S. Yu. 2013 Proofs of Retrievability with public verifiability and constant communication cost in cloud. In Proceedings of the International Workshop on Security in Cloud Computing, ser. Cloud Computing ’13. Hangzhou, China: ACM.
  12. A. De Caro and V. Iovino. 2011 jpbc: Java pairing based cryptography. In Proceedings of the 16th IEEE Symposium on Computers and Communications.
  13. J. Yuan and S. Yu. 2013 Secure and constant cost public cloud storage auditing with deduplication. In Proceedings of the 1st IEEE Conference on Communications and Network Security, ser. CNS’13, Washington, USA.
  14. D. Boneh, B. Lynn, and H. Shacham. 2001 Short signatures from the weil pairing. In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology.
  15. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou 2013 Privacy preserving public auditing for secure cloud storage,” IEEE Transactions on Computers.
  16. J. Yuan and S. Yu. 2013 Proofs of retrievability with public verifiability and constant communication cost in cloud. In Proceedings of the International Workshop on Security in Cloud Computing, ser. Cloud Computing ’13. Hangzhou, China: ACM.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Integrity Auditing privacy Preserving Public Verification Batch Verification