CFP last date
20 January 2025
Reseach Article

Review on Public Auditing for Cloud Storage using Third Party Auditors

by Priyanka Bhor, Sumedh Pundkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 10
Year of Publication: 2016
Authors: Priyanka Bhor, Sumedh Pundkar
10.5120/ijca2016909929

Priyanka Bhor, Sumedh Pundkar . Review on Public Auditing for Cloud Storage using Third Party Auditors. International Journal of Computer Applications. 142, 10 ( May 2016), 9-12. DOI=10.5120/ijca2016909929

@article{ 10.5120/ijca2016909929,
author = { Priyanka Bhor, Sumedh Pundkar },
title = { Review on Public Auditing for Cloud Storage using Third Party Auditors },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 10 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number10/24930-2016909929/ },
doi = { 10.5120/ijca2016909929 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:36.264123+05:30
%A Priyanka Bhor
%A Sumedh Pundkar
%T Review on Public Auditing for Cloud Storage using Third Party Auditors
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 10
%P 9-12
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is recent blooming technology which provides various services like storage, platform, applications etc. through internet. In cloud computing, data owner hosts (stores) their data on cloud servers and data users access those data through cloud servers any time and from any place. This leads to data outsourcing on cloud in high amount. But because of vast amount of data on cloud, it increases security challenges again on data integrity, authenticity and confidentiality in the form of data hacking. Here data owner has no idea about the whereabouts of storage locations. To check for the data loss, data owner has to be online continuously and monitor the data all the time; hence increases the overhead on data owner which owner surely wants to avoid because that’s the reason of using cloud services. So the strong need of security mechanism, introduces the concept of Third Party Auditor (TPA) to the world. Cloud’s public audit ability lets third party auditor (TPA) checks for data integrity. Here in this paper, various issues and challenges come across when data is stored on cloud, has been analyzed. Various papers discussed here, describes various techniques for secure cloud storage to provide privacy preserving public auditing.

References
  1. Zhu,Y.,Hu, H.,Ahn, G.,Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12) 2231–2244 (2012)
  2. Yan Zhua,b, Hongxin Huc, Gail-Joon Ahnc, Stephen S. Yauc. ―Efficient audit service outsourcing for data integrity in clouds‖. In ―The Journal of Systems and Software 85 (2012) 1083– 1095
  3. A. Juels and B. S. Kaliski, Jr., “PORs: Proofs of retrievability forlarge files,” in Proc. 14th ACM Conf. Comput. Commun.Secur, 2007,pp. 584–597.
  4. G.Ateniese et al., ―Provable Data Possession at Untrusted Stores,‖ Proc. ACM CCS ‗07, Oct. 2007, pp. 598–609.
  5. K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A high-availability andintegrity layer for cloud storage,” in Proc. 16th ACM Conf. ComputCommun. Secur., 2009, pp. 187–198.
  6. Jyoti R Bolannavar, ”privacy preserving public auditing using TPA for secure cloud storage.”, International Journal of Scientific Engineering and research
  7. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Trans. Parallel Distrib. Syst.,vol. 24, no. 9, pp. 1717–1726, Sep. 2013
  8. Dr. G.K. Kamalam, B. Neka, E. Jamunadevi, “Secure and Efficient Privacy Preserving Public auditing scheme for cloud Storage”, International Journal of Computer Network and Security,2015
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Storage Public Auditing Third Party Auditors Encryption Integrity.