Public Auditing for Big Data Storage in Cloud Computing -- A Survey

作者: Chang Liu , Rajiv Ranjan , Xuyun Zhang , Chi Yang , Dimitrios Georgakopoulos

DOI: 10.1109/CSE.2013.164

关键词:

摘要: Data integrity is an important factor to ensure in almost any data and computation related context. It serves not only as one of the qualities service, but also part security privacy. With proliferation cloud computing increasing needs big analytics, verification becomes increasingly important, especially on outsourced data. Therefore, research topics have attracted tremendous interest. Among all metrics, efficiency are two most concerned measurements. In this paper, we provide analysis authenticator-based efficient verification. will analyze a survey main aspects problem, summarize motivations, methodologies well achievements several representative approaches, then try bring forth blueprint for possible future developments.

参考文章(24)
Hovav Shacham, Brent Waters, Compact Proofs of Retrievability international conference on the theory and application of cryptology and information security. pp. 90- 107 ,(2008) , 10.1007/978-3-540-89255-7_7
Robert Johnson, David Molnar, Dawn Song, David Wagner, Homomorphic Signature Schemes the cryptographers track at the rsa conference. pp. 244- 262 ,(2002) , 10.1007/3-540-45760-7_17
Ralph C. Merkle, A Digital Signature Based on a Conventional Encryption Function international cryptology conference. pp. 369- 378 ,(1987) , 10.1007/3-540-48184-2_32
Giuseppe Ateniese, Seny Kamara, Jonathan Katz, Proofs of Storage from Homomorphic Identification Protocols international conference on the theory and application of cryptology and information security. ,vol. 5912, pp. 319- 333 ,(2009) , 10.1007/978-3-642-10366-7_19
Lizhe Wang, Marcel Kunze, Jie Tao, Gregor von Laszewski, Towards building a cloud for scientific applications Advances in Engineering Software. ,vol. 42, pp. 714- 722 ,(2011) , 10.1016/J.ADVENGSOFT.2011.05.007
Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, Wenjing Lou, Privacy-Preserving Public Auditing for Secure Cloud Storage IEEE Transactions on Computers. ,vol. 62, pp. 362- 375 ,(2013) , 10.1109/TC.2011.245
Boyang Wang, Sherman S.M. Chow, Ming Li, Hui Li, Storing Shared Data on the Cloud via Security-Mediator international conference on distributed computing systems. pp. 124- 133 ,(2013) , 10.1109/ICDCS.2013.60
Dan Boneh, Ben Lynn, Hovav Shacham, Short Signatures from the Weil Pairing Journal of Cryptology. ,vol. 17, pp. 297- 319 ,(2004) , 10.1007/S00145-004-0314-9
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage IEEE Transactions on Parallel and Distributed Systems. ,vol. 23, pp. 2231- 2244 ,(2012) , 10.1109/TPDS.2012.66
Dimitrios Zissis, Dimitrios Lekkas, Addressing cloud computing security issues Future Generation Computer Systems. ,vol. 28, pp. 583- 592 ,(2012) , 10.1016/J.FUTURE.2010.12.006