A Survey on Data Auditing Approaches to Preserve Privacy and Data Integrity in Cloud Computing

  • V. KavyaEmail author
  • R. Sumathi
  • A. N. Shwetha
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 39)


Cloud computing is recognized as one of the prominent and rapid growing technologies in this contemporary world. Cloud allows the users to store the data without any physical infrastructure and it provides access to the users over the internet anywhere and at any time without harming its accuracy and reliability. However, on the other hand storing data in the cloud creates an inconvenience to the users by creating security issues like data integrity, privacy & availability in cloud. Security exists as one of the recent research challenges in the cloud. The data stored on the cloud can be hacked and altered by any person and sometimes even the data can be deleted by the Cloud Service Provider (CSP) for his own personal benefit. So, there exist many solutions to solve the security issues in the cloud. Data auditing is found as one of the popular approach to provide integrity and privacy using Third Party Auditor (TPA). In this paper, pros and cons of six different data auditing schemes are discussed along with the results.


Cloud computing Third Party Auditor Cloud Service Provider (CSP) Data auditing 


  1. 1.
    Jakhotia, K., Bhosale, R.: Novel architecture for enabling proof of retrievability using AES algorithm. In: ICCMC. IEEE (2017)Google Scholar
  2. 2.
    Gajendra, B.P., Singh, V.K.: Achieving cloud security using third party auditor, MD-5 and identity-base encryption. In: IEEE (2016)Google Scholar
  3. 3.
    More, S.S., Chaudhari, S.S: Secure and efficient public auditing scheme for cloud storage. In: IEEE (2016)Google Scholar
  4. 4.
    Salunkhe, S.D., Patil, D.: Division and replication for data with public auditing scheme for cloud storage. In: IEEE (2016)Google Scholar
  5. 5.
    Kaura, W.C.N., Lal, A.: Survey paper on cloud computing security. In: ICIIECS. IEEE (2017)Google Scholar
  6. 6.
    Rashmi, R.P., Sangve, S.M.: Public auditing system: improved remote data possession checking protocol for secure cloud storage. In: IEEE (2015)Google Scholar
  7. 7.
    Chakraborty, S., Singh, S.: Integrity checking using third party auditor in cloud storage. In: International Conference on Contemporary Computing. IEEE (2018)Google Scholar
  8. 8.
    Rajeswari, S., Kalaiselvi, R.: Survey of data and storage security in cloud computing. In: ICCS. IEEE (2017)Google Scholar
  9. 9.
    Sawant, N.M., Mane, N.S.: A survey on auditing techniques used for preserving privacy of data stored on cloud. In: ICEEOT. IEEE (2016)Google Scholar
  10. 10.
    Bhavani, S.D., Sudhakar, G.: A survey of auditing techniques for privacy preserving and ensure data correctness in the cloud. In: IJARCSSE (2017)Google Scholar
  11. 11.
    Kolhar, M., Abu-Alhaj, M.M., El-atty, S.M.A.: Cloud data auditing techniques with a focus on privacy and security. IEEE Secur. Priv. 15(1), 42–51 (2017)CrossRefGoogle Scholar
  12. 12.
    Rao, C.C., Leelarani, M., Kumar, Y.R.: Cloud computing services and deployment models. IJECS 2(12), 3389–3390 (2013)Google Scholar
  13. 13.
    Geeta, C.M., Raghavendra, S., Rajkumar, B., Venugopal, K.R., Iyengar, S.S., Patnaik, L.M.: Data auditing and security in cloud computing: issues, challenges and future direction. Int. J. Comput. (IJC) 28(1), 8–57 (2018)Google Scholar
  14. 14.
    Hiremath, S., Kunte, S.: A novel data auditing approach to achieve data privacy and data integrity in cloud computing. In: ICEECCOT. IEEE (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of CSESiddaganga Institute of TechnologyTumakuruIndia

Personalised recommendations