CFP last date
20 March 2024
Reseach Article

A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing

by Ridham Kapadiya, Jignesh Prajapati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 14
Year of Publication: 2015
Authors: Ridham Kapadiya, Jignesh Prajapati
10.5120/19384-0816

Ridham Kapadiya, Jignesh Prajapati . A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing. International Journal of Computer Applications. 110, 14 ( January 2015), 19-21. DOI=10.5120/19384-0816

@article{ 10.5120/19384-0816,
author = { Ridham Kapadiya, Jignesh Prajapati },
title = { A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 14 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number14/19384-0816/ },
doi = { 10.5120/19384-0816 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:46:21.328402+05:30
%A Ridham Kapadiya
%A Jignesh Prajapati
%T A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 14
%P 19-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days, cloud computing can be termed as service provider on demand. It has become centralized data storage for the huge amount of data. A user must be concerning about the protection and correctness of his data when he outsources his data to remote data storage as a cloud. Public auditing mechanism enables a user to verify the correctness and integrity of his data with the use of Third Party Auditor (TPA). Public auditing techniques perform auditing task without downloading the whole file. This reduces server overhead. Privacy preserving public auditing do not reveal the identity of the user. This paper describes various privacy preserving public auditing techniques. It also shows comparative study among them.

References
  1. B. Wang, B. Li, and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," Proc. IEEE Fifth Int'l Conf. Cloud Computing, pp. 295-302, 2012.
  2. B. Wang, B. Li, and H. Li, "Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud," Proc. 10th Int'l Conf. Applied Cryptography and Network Security (ACNS'12),pp. 507-525, June 2012.
  3. P. Maheswari, B. Sindhumathi, " AFS: Privacy-Preserving Public Auditing With Data Freshness in the Cloud ", IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727 PP 56-63
  4. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proc. IEEE INFOCOM, pp. 525-533, 2010.
  5. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-610, 2007.
  6. H. Shacham and B. Waters, "Compact Proofs of Retrievability," Proc. 14th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '08), pp. 90-107, 2008.
  7. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,"Dynamic Provable Data Possession," Proc. 16th ACM Conf. Computer and Comm. Security (CCS'09), pp. 213-222, 2009.
  8. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing," Proc. 14th European Conf. Research in Computer Security (ESORICS'09), pp. 355-370, 2009.
  9. C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," Proc. 17th Int'l Workshop Quality of Service (IWQoS'09), pp. 1-9, 2009.
  10. B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote Data Checking for Network Coding-Based Distributed Storage Systems,"Proc. ACM Workshop Cloud Computing Security Workshop (CCSW'10), pp. 31-42, 2010.
  11. Y. Zhu, H. Wang, Z. Hu, G. -J. Ahn, H. Hu, and S. S Yau,"Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds," Proc. ACM Symp. Applied Computing (SAC'11), pp. 1550-1557, 2011.
  12. N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, "LT Codes-Based Secure and Reliable Cloud Storage Service," Proc. IEEE INFOCOM,2012.
  13. B. Wang, B. Li, and H. Li, "Certificateless Public Auditing for Data Integrity in the Cloud," Proc. IEEE Conf. Comm. and Network Security (CNS'13), pp. 276-284, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Shared Data public auditing identity privacy