Skip to main content

Public Auditing Schemes (PAS) for Dynamic Data in Cloud: A Review

  • Conference paper
  • First Online:
Smart Trends in Information Technology and Computer Communications (SmartCom 2017)

Abstract

With the manifestation of cloud computing, storage on the cloud has become a rising trend. It facilates users to store their data on remote server. Security being one of the most concern issue in cloud computing. The principles of security applied for stored data is blooming topic of research. Various methods have been reported in literature for secure & efficient public audit scheme. but, these methods are not secure against various attacks like sybil, resource depletion & cloud storage leakage. It is found that several schemes can provide an efficient public auditing scheme based on vector commitment, verifier-local revocation, group signature. The present paper focuses on different schemes available for maintaining security in case of dynamic data in the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shuchengyu, Y.J.: Public integrity auditing for dynamic data sharing with multi-user modification. In: Proceedings of IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1717–1726 (2015)

    Google Scholar 

  2. Sugarsync. https://www.sugarsync.com/business

  3. Amazon simple storage service (s3). http://aws.amazon.com/s3

  4. Dropbox. https://www.dropbox.com

  5. Google drive. http://drive.google.com

  6. Juels, A., Kalisk, B.S.: PORS proof of retrievability for large files. In: 14th ACM Conference on Computation and Communications Security, pp. 584–597, October 2007

    Google Scholar 

  7. Wang, C., Wang, Q.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 525–533, March 2010

    Google Scholar 

  8. Wang, B., Baochum, L.: Public auditing for shared with efficient user revocation in the cloud. In: Proceedings of IEEE INFOCOM, pp. 2904–2912, April 2013

    Google Scholar 

  9. Le, A.: Äuditing for distributed storage system. IEEE Trans. Netw. 24, 1–36 (2015)

    Google Scholar 

  10. Wang, J., Chen, X.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64, 3293–3303 (2015)

    Article  MathSciNet  Google Scholar 

  11. Yuchuan, L., Shaojing, F.: Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage. IEEE China Commun. 11, 114–124 (2014)

    Article  Google Scholar 

  12. Wang, B., Hui, L.: Efficient public verification on the integrity of multi-owner data in the cloud. J. Commun. Netw. 16, 592–599 (2014)

    Article  Google Scholar 

  13. Wang, B., Baochun, L., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. Proc. IEEE Trans. Cloud Comput. 2(1), 43–56 (2014)

    Article  Google Scholar 

  14. Yuan, J., Yu, C.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of IEEE INFOCOM Toronto, Canada, pp. 2121–2129, April 2014

    Google Scholar 

  15. Wang, C., Sherman, S.M.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  16. Wang, C., Wang, Q.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5, 220–232 (2012)

    Article  Google Scholar 

  17. Wang, Q., Wang, C.: Enabling public auditability and data dynamics for storage security in cloud computing. Proc. IEEE Trans. Parallel Distrib. Syst. 22, 847–859 (2011)

    Article  Google Scholar 

  18. Catalano, D., Fiore, D.: Vector commitments and their applications. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 55–72. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36362-7_5

    Chapter  Google Scholar 

  19. Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_9

    Chapter  Google Scholar 

  20. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: Thai, My T., Sahni, S. (eds.) COCOON 2010. LNCS, vol. 6196, pp. 510–519. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14031-0_54

    Chapter  Google Scholar 

  21. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30

    Chapter  Google Scholar 

  22. Chaum, D., van Heyst, E.: Group signatures. In: Davies, Donald W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-46416-6_22

    Chapter  Google Scholar 

  23. Dan, B., Hovav, S.: Group signatures with-local revocation. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 168–177, 25–29 October 2004

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dipa Dharamadhikari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dharamadhikari, D., Tamne, S. (2018). Public Auditing Schemes (PAS) for Dynamic Data in Cloud: A Review. In: Deshpande, A., et al. Smart Trends in Information Technology and Computer Communications. SmartCom 2017. Communications in Computer and Information Science, vol 876. Springer, Singapore. https://doi.org/10.1007/978-981-13-1423-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1423-0_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1422-3

  • Online ISBN: 978-981-13-1423-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics