Multiple-replica integrity auditing schemes for cloud data storage

被引:8
|
作者
Lin, Yangfei [1 ]
Li, Jie [2 ]
Jia, Xiaohua [3 ]
Ren, Kui [4 ]
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Ibaraki, Japan
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, 800 Dongchuan Rd, Shanghai 200240, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[4] SUNY Buffalo, Dept Comp Sci & Engn, New York, NY USA
来源
关键词
data auditing; data integrity; multicloud data storage; multireplicas; DATA POSSESSION; BIG DATA; SECURITY; PROTOCOL; PRIVACY;
D O I
10.1002/cpe.5356
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has been an essential technology for providing on-demand computing resources as a service on the Internet. Not only enterprises but also individuals can outsource their data to the cloud without worrying about purchase and maintenance cost. The cloud storage system, however, is not fully trustable. Cloud data integrity auditing is crucial for defending against the security threats of data in the untrusted multicloud environment. Storing multiple replicas is a commonly used strategy for the availability and reliability of critical data. In this paper, we summarize and analyze the state-of-the-art multiple-replica integrity auditing schemes in cloud data storage. We present the system model and security threats of outsourcing data to the cloud with classification of ongoing developments. We also summarize the existing data integrity auditing schemes for multicloud data storage. The important open issues and potential research directions are addressed.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] AUDITING OF DATA INTEGRITY OVER DYNAMIC DATA IN CLOUD
    Kumar, P. Santhosh
    Parthiban, Latha
    Jegatheeswari, V.
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 43 - 48
  • [32] A Compressive Integrity Auditing Protocol for Secure Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) : 1197 - 1209
  • [33] Certificateless Public Auditing for Data Integrity in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    Li, Fenghua
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 136 - 144
  • [34] Public Auditing: Cloud Data Storage
    Parwekar, Pritee
    Saxena, Mayuri
    Kumar, Prakash
    Saxena, Sakshi
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 169 - 173
  • [35] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [36] Certificateless Remote Data Integrity Auditing with Access Control of Sensitive Information in Cloud Storage
    Bian, Genqing
    Zhang, Fan
    Li, Rong
    Shao, Bilin
    ELECTRONICS, 2022, 11 (19)
  • [37] Certificateless Data Integrity Auditing in Cloud Storage with a Designated Verifier and User Privacy Preservation
    Bian, Genqing
    Guo, Xusen
    Li, Rong
    Qu, Wenjing
    Zhao, Yu
    ELECTRONICS, 2022, 11 (23)
  • [38] Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
    Yuan, Yilin
    Gu, Yifan
    Zhang, Zhenzhen
    International Journal of Network Security, 2023, 25 (04) : 609 - 619
  • [39] LDuAP: lightweight dual auditing protocol to verify data integrity in cloud storage servers
    Yoosuf, Mohamed Sirajudeen
    Anitha, R.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (8) : 3787 - 3805
  • [40] Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
    Liu, Zhenpeng
    Wang, Shuo
    Duan, Sichen
    Ren, Lele
    Wei, Jianhang
    ELECTRONICS, 2023, 12 (03)