Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

被引:13
作者
Goswami, Paromita [1 ,2 ]
Faujdar, Neetu [2 ]
Debnath, Somen [3 ]
Khan, Ajoy Kumar [1 ]
Singh, Ghanshyam [4 ]
机构
[1] Mizoram Univ, Dept Comp Engn, Aizawl 796004, MZ, India
[2] GLA Univ, Dept Comp Engn & Applicat, Mathura 281406, UP, India
[3] Tripura Univ, Dept Comp Sci & Enginering, Agartala 796022, Tripura, India
[4] Univ Johannesburg, Ctr Smart Informat & Commun Syst, Dept Elect & Elect Engn Sci, Auckland Pk Campus, POB 524, ZA-2006 Johannesburg, South Africa
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2024年 / 13卷 / 01期
关键词
Cloud computing; Data integrity; Security attacks; Cloud storage; Data auditing; Security challenges; PROVABLE DATA POSSESSION; BIG DATA-STORAGE; ACCESS-CONTROL; AUDITING PROTOCOL; DATA DYNAMICS; SCHEME; PROOF; VERIFICATION; RETRIEVABILITY; PROTECTION;
D O I
10.1186/s13677-024-00605-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performance, support, cost, and reliability compared to traditional storage methods. However, despite the benefits of disaster recovery, scalability, and resource backup, some organizations still prefer traditional data storage over cloud storage due to concerns about data correctness and security. Data integrity is a critical issue in cloud computing, as data owners need to rely on third-party cloud storage providers to handle their data. To address this, researchers have been developing new algorithms for data integrity strategies in cloud storage to enhance security and ensure the accuracy of outsourced data. This article aims to highlight the security issues and possible attacks on cloud storage, as well as discussing the phases, characteristics, and classification of data integrity strategies. A comparative analysis of these strategies in the context of cloud storage is also presented. Furthermore, the overhead parameters of auditing system models in cloud computing are examined, considering the desired design goals. By understanding and addressing these factors, organizations can make informed decisions about their cloud storage solutions, taking into account both security and performance considerations.
引用
收藏
页数:23
相关论文
共 150 条
[1]   A survey on data leakage prevention systems [J].
Alneyadi, Sultan ;
Sithirasenan, Elankayer ;
Muthukkumarasamy, Vallipuram .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 :137-152
[2]   Data Security Enhancement in Public Cloud Storage using Data Obfuscation and Steganography [J].
Amalarethinam, D. I. George ;
FathimaMary, B. .
2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, :181-184
[3]  
Anuradha V P., 2014, International Conference on Information Communication and Embedded Systems (ICICES2014), P1, DOI DOI 10.1109/ICICES.2014.7033931
[4]   S-Audit: Efficient Data Integrity Verification for Cloud Storage [J].
Apolinario, Filipe ;
Pardal, Miguel L. ;
Correia, Miguel .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :465-474
[5]  
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI DOI 10.1145/1460877.1460889
[6]   The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds [J].
Bakas, Alexandros ;
Dang, Hai-Van ;
Michalas, Antonis ;
Zalitko, Alexandr .
IEEE ACCESS, 2020, 8 (08) :210462-210477
[7]   Recent advancements in the breeding of sorghum crop: current status and future strategies for marker-assisted breeding [J].
Baloch, Faheem Shehzad ;
Altaf, Muhammad Tanveer ;
Liaqat, Waqas ;
Bedir, Mehmet ;
Nadeem, Muhammad Azhar ;
Comertpay, Gonul ;
Coban, Nergiz ;
Habyarimana, Ephrem ;
Barutcular, Celaleddin ;
Cerit, Ibrahim ;
Ludidi, Ndomelele ;
Karakoy, Tolga ;
Aasim, Muhammad ;
Chung, Yong Suk ;
Nawaz, Muhammad Amjad ;
Hatipoglu, Rustu ;
Kokten, Kagan ;
Sun, Hyeon-Jin .
FRONTIERS IN GENETICS, 2023, 14
[8]   Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment [J].
Bian, Genqing ;
Fu, Yanru ;
Shao, Bilin ;
Zhang, Fan .
IEEE ACCESS, 2022, 10 :39743-39751
[9]   Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case [J].
Bian, Genqing ;
Chang, Jinyong .
IEEE ACCESS, 2020, 8 :102958-102970
[10]  
Bonomi F., 2012, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, V1, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]