Abstract
In this paper, various protocols for data integrity auditing in cloud computing have been analyzed. The system models and threat models for data integrity auditing have been presented. Brief reviews on mathematical and cryptographic methods used to devise data integrity auditing protocols have been done. A comparative analysis of existing data integrity auditing protocols chronologically first, based on development methods is presented. Further, a specific analysis based on security methods, storage overheads, computation cost and communication cost is comprehended and presented in tabulated form. A comprehensive view of desirable properties of these protocols is presented later. Finally, the challenges in the composition of a dynamic data integrity auditing protocol for cloud computing environment have been highlighted.
Original language | English |
---|---|
Pages (from-to) | 17-32 |
Number of pages | 16 |
Journal | Journal of network and computer applications |
Volume | 66 |
DOIs | |
Publication status | Published - 31 Mar 2016 |
Keywords / Materials (for Non-textual outputs)
- cloud computing
- data integrity
- data integrity auditing
- third party auditing