CFP last date
20 January 2025
Reseach Article

Review of Privacy Preserving Public Auditing Techniques

by Sarah Shaikh, Deepali Vora
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 13
Year of Publication: 2016
Authors: Sarah Shaikh, Deepali Vora
10.5120/ijca2016910836

Sarah Shaikh, Deepali Vora . Review of Privacy Preserving Public Auditing Techniques. International Journal of Computer Applications. 145, 13 ( Jul 2016), 6-8. DOI=10.5120/ijca2016910836

@article{ 10.5120/ijca2016910836,
author = { Sarah Shaikh, Deepali Vora },
title = { Review of Privacy Preserving Public Auditing Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 13 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number13/25336-2016910836/ },
doi = { 10.5120/ijca2016910836 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:42.928890+05:30
%A Sarah Shaikh
%A Deepali Vora
%T Review of Privacy Preserving Public Auditing Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 13
%P 6-8
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing provides services where users can store their data remotely on cloud and can access their data from anywhere, anytime by means of internet. Cloud computing enables users to use the data stored on cloud as if the data is local without worrying about its accuracy and reliability. But a major challenge in cloud computing is to ensure the integrity of user’s outsourced data on cloud server. Public auditing service makes use of an independent third party to check data storage correctness on cloud on behalf of data owner itself. This paper analyzes various techniques employed in order to perform secure cloud auditing to verify the integrity of outsourced data on cloud. Also it discusses limitations associated with these protocols and lastly proposes a scheme to ensure privacy and security in public auditing for cloud storage

References
  1. G.Ateniese, “Provable Data Possession at Untrusted Stores”, Proc. 14th ACM Conf. Computer and Comm. Security (CCS’ 07), 2007.
  2. G.Ateniese, “Scalable and Efficient Provable Data Possession”, Proc.Fourth Int’l Conf. Security and Privacy in Comm. Networks (SecureComm ’08), 2008.
  3. Juels, “Pors: Proofs of Retrievability for Large Files”, Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 584-597, 2007.
  4. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008.
  5. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu and S.S Yau,“Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds,” Proc. ACM Symp. Applied Computing (SAC’11), pp. 1550-1557, 2011.
  6. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” Proc. IEEE Fifth Int’l Conf. Cloud Computing, pp. 43-56, 2014.
  7. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public auditing for storage security in cloud computing,” in Proc.of IEEE INFOCOM’10, March 2010.
  8. Q. Wang, C. Wang, K.Ren, W. Lou and Jin Li “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Transaction on Parallel and Distributed System, vol. 22, no. 5, pp. 847 –859, 2011.
  9. C. Wang, Sherman S. M. Chow, Q. Wang, K. Ren and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE Transaction on Computers I, vol. 62, no. 2, pp.362-375, February 2013.
  10. Trushna S Khatri, G B Jethava “Improving Dynamic Data Integrity Verification in Cloud Computing”, 4th ICCCNT 2013.
  11. Poonam M. Pardeshi,”Improving Data Integrity for Data Storage Security in Cloud Computing” ,International Journal of Computer Science and Information Technologies, Vol. 5(5), 2014.
  12. Sawan V. Baghel, Deepti P. Theng,” A Survey for Secure Communication of Cloud Third Party Authenticator “, IEEE 2nd International Conference on Electronics and Communication Systems, ICECS ‘2015.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Data Integrity ElGamal algorithm SHA-256 Third party auditor.