Abstract
With the manifestation of cloud computing, storage on the cloud has become a rising trend. It facilates users to store their data on remote server. Security being one of the most concern issue in cloud computing. The principles of security applied for stored data is blooming topic of research. Various methods have been reported in literature for secure & efficient public audit scheme. but, these methods are not secure against various attacks like sybil, resource depletion & cloud storage leakage. It is found that several schemes can provide an efficient public auditing scheme based on vector commitment, verifier-local revocation, group signature. The present paper focuses on different schemes available for maintaining security in case of dynamic data in the cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shuchengyu, Y.J.: Public integrity auditing for dynamic data sharing with multi-user modification. In: Proceedings of IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1717–1726 (2015)
Sugarsync. https://www.sugarsync.com/business
Amazon simple storage service (s3). http://aws.amazon.com/s3
Dropbox. https://www.dropbox.com
Google drive. http://drive.google.com
Juels, A., Kalisk, B.S.: PORS proof of retrievability for large files. In: 14th ACM Conference on Computation and Communications Security, pp. 584–597, October 2007
Wang, C., Wang, Q.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 525–533, March 2010
Wang, B., Baochum, L.: Public auditing for shared with efficient user revocation in the cloud. In: Proceedings of IEEE INFOCOM, pp. 2904–2912, April 2013
Le, A.: Äuditing for distributed storage system. IEEE Trans. Netw. 24, 1–36 (2015)
Wang, J., Chen, X.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64, 3293–3303 (2015)
Yuchuan, L., Shaojing, F.: Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage. IEEE China Commun. 11, 114–124 (2014)
Wang, B., Hui, L.: Efficient public verification on the integrity of multi-owner data in the cloud. J. Commun. Netw. 16, 592–599 (2014)
Wang, B., Baochun, L., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. Proc. IEEE Trans. Cloud Comput. 2(1), 43–56 (2014)
Yuan, J., Yu, C.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of IEEE INFOCOM Toronto, Canada, pp. 2121–2129, April 2014
Wang, C., Sherman, S.M.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362–375 (2013)
Wang, C., Wang, Q.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5, 220–232 (2012)
Wang, Q., Wang, C.: Enabling public auditability and data dynamics for storage security in cloud computing. Proc. IEEE Trans. Parallel Distrib. Syst. 22, 847–859 (2011)
Catalano, D., Fiore, D.: Vector commitments and their applications. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 55–72. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36362-7_5
Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_9
Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: Thai, My T., Sahni, S. (eds.) COCOON 2010. LNCS, vol. 6196, pp. 510–519. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14031-0_54
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30
Chaum, D., van Heyst, E.: Group signatures. In: Davies, Donald W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-46416-6_22
Dan, B., Hovav, S.: Group signatures with-local revocation. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 168–177, 25–29 October 2004
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dharamadhikari, D., Tamne, S. (2018). Public Auditing Schemes (PAS) for Dynamic Data in Cloud: A Review. In: Deshpande, A., et al. Smart Trends in Information Technology and Computer Communications. SmartCom 2017. Communications in Computer and Information Science, vol 876. Springer, Singapore. https://doi.org/10.1007/978-981-13-1423-0_21
Download citation
DOI: https://doi.org/10.1007/978-981-13-1423-0_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1422-3
Online ISBN: 978-981-13-1423-0
eBook Packages: Computer ScienceComputer Science (R0)