Multiple-replica integrity auditing schemes for cloud data storage

被引:8
作者
Lin, Yangfei [1 ]
Li, Jie [2 ]
Jia, Xiaohua [3 ]
Ren, Kui [4 ]
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Ibaraki, Japan
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, 800 Dongchuan Rd, Shanghai 200240, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[4] SUNY Buffalo, Dept Comp Sci & Engn, New York, NY USA
关键词
data auditing; data integrity; multicloud data storage; multireplicas; DATA POSSESSION; BIG DATA; SECURITY; PROTOCOL; PRIVACY;
D O I
10.1002/cpe.5356
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has been an essential technology for providing on-demand computing resources as a service on the Internet. Not only enterprises but also individuals can outsource their data to the cloud without worrying about purchase and maintenance cost. The cloud storage system, however, is not fully trustable. Cloud data integrity auditing is crucial for defending against the security threats of data in the untrusted multicloud environment. Storing multiple replicas is a commonly used strategy for the availability and reliability of critical data. In this paper, we summarize and analyze the state-of-the-art multiple-replica integrity auditing schemes in cloud data storage. We present the system model and security threats of outsourcing data to the cloud with classification of ongoing developments. We also summarize the existing data integrity auditing schemes for multicloud data storage. The important open issues and potential research directions are addressed.
引用
收藏
页数:14
相关论文
共 64 条
  • [1] Integrity as a service for replicated data on the cloud
    Abo-alian, Alshaimaa
    Badr, Nagwa L.
    Tolba, M. F.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (04)
  • [2] AlZain MA., 2012, 45 HAW INT C SYST SC
  • [3] *AM, AM SIMPL STOR SERV A
  • [4] Ateniese G., 2008, P 4 INT C SEC PRIV C, P1
  • [5] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [6] Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
  • [7] Barsoum A., 2015, INT J COMPUT APPL, V123
  • [8] Barsoum A.F., 2010, Provable Possession and Replication of Data over Cloud Servers
  • [9] BARSOUM A.F., 2011, IACR Cryptology ePrint Archive, Report 2011/447
  • [10] DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds
    Bessani, Alysson
    Correia, Miguel
    Quaresma, Bruno
    Andre, Fernando
    Sousa, Paulo
    [J]. ACM TRANSACTIONS ON STORAGE, 2013, 9 (04)