We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Survey on Data Integrity Checking Protocols in Cloud Computing

Published on December 2013 by P. Parvathi, T. Meyyappan
International Conference on Computing and information Technology 2013
Foundation of Computer Science USA
IC2IT - Number 3
December 2013
Authors: P. Parvathi, T. Meyyappan
b3a76f57-3068-411a-bc9a-50370d61d589

P. Parvathi, T. Meyyappan . Survey on Data Integrity Checking Protocols in Cloud Computing. International Conference on Computing and information Technology 2013. IC2IT, 3 (December 2013), 23-25.

@article{
author = { P. Parvathi, T. Meyyappan },
title = { Survey on Data Integrity Checking Protocols in Cloud Computing },
journal = { International Conference on Computing and information Technology 2013 },
issue_date = { December 2013 },
volume = { IC2IT },
number = { 3 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 23-25 },
numpages = 3,
url = { /proceedings/ic2it/number3/14403-1340/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Computing and information Technology 2013
%A P. Parvathi
%A T. Meyyappan
%T Survey on Data Integrity Checking Protocols in Cloud Computing
%J International Conference on Computing and information Technology 2013
%@ 0975-8887
%V IC2IT
%N 3
%P 23-25
%D 2013
%I International Journal of Computer Applications
Abstract

Cloud computing is a internet based computing model that supports convenient ,on-demand and pay-for-use model. In this computing, data owners host their data on cloud servers and clients can access the data from cloud servers. Due to the data outsourcing, efficient verification of the outsourced data becomes a formidable challenge for data security in Cloud Computing (CC). Therefore, an independent auditing service is required to make sure that the data is correctly hosted in the Cloud. Several protocols are introduced for performing integrity in cloud storage. This paper focuses on the different integrity checking protocols to address the above issue. This paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations.

References
  1. Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In Proceedings of the 4th international conference on security and privacy in communication networks (SecureComm'08), 1–10, 2008.
  2. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security, ACM, 2007, 598–609.
  3. Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. 16th ACM Conference on Computer and Communications Security CCS, November 9–13, 2009.
  4. Juels A, Kaliski BS (2007) PORs: proofs of retrievability for large files. Cryptology ePrint archive, June 2007. Report 2007/243.
  5. Sebé F, Domingo-Ferrer J, Martínez-Ballesté A, Deswarte Y, Quisquater J-J (2007) Efficient remote data possession checking in critical information infrastructures. IEEE Trans Knowl Data Eng 20:1034–1038, Aug 2008. ISSN:1041-4347.
  6. Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 29th conference on information communications, San Diego, California, USA,525–533, March 14–19, 2010.
  7. Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint Malo,France, pp. 355–70, September 21–25, 2009.
  8. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia "Dynamic Provable Data Possession," Proc. 16th ACM Conf, Computer and Comm. Security (CCS '09), 2009.
  9. C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," Proc. 17th Int'l Workshop Quality of Service (IWQoS '09), 2009.
  10. C. Wang, Q. Wang, K. Ren, and W. Lou,"Towards Secure and Dependable Storage Service in Cloud Computing" 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Integrity Data Outsourcing