Comparative analysis of cloud data integrity auditing protocols

Neenu Garg*, Seema Bawa

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper, various protocols for data integrity auditing in cloud computing have been analyzed. The system models and threat models for data integrity auditing have been presented. Brief reviews on mathematical and cryptographic methods used to devise data integrity auditing protocols have been done. A comparative analysis of existing data integrity auditing protocols chronologically first, based on development methods is presented. Further, a specific analysis based on security methods, storage overheads, computation cost and communication cost is comprehended and presented in tabulated form. A comprehensive view of desirable properties of these protocols is presented later. Finally, the challenges in the composition of a dynamic data integrity auditing protocol for cloud computing environment have been highlighted.
Original languageEnglish
Pages (from-to)17-32
Number of pages16
JournalJournal of network and computer applications
Volume66
DOIs
Publication statusPublished - 31 Mar 2016

Keywords / Materials (for Non-textual outputs)

  • cloud computing
  • data integrity
  • data integrity auditing
  • third party auditing

Fingerprint

Dive into the research topics of 'Comparative analysis of cloud data integrity auditing protocols'. Together they form a unique fingerprint.

Cite this