Cloud computing is environment which enables convenient, efficient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud is kind of centralized database where many organizations/clients store their data, retrieve data and possibly modify data. Cloud is a model where user is provided services by CSP(Cloud Service Provider) on pay per use base. Means here Client has to pay for what he is using or being served. Data stored and retrieved in such a way may not be fully trustworthy so here concept of TPA(Third Party Auditor) is used. TPA makes task of client easy by verifying integrity of data stored on behalf of client. In cloud, there is support for data dynamics means clients can insert, delete or can update data so there should be security mechanism which ensure integrity for the same. Here TPA can not only see the data but he can access data or can modify also so there should be some security mechanism against this.
[1]
Reza Curtmola,et al.
Provable data possession at untrusted stores
,
2007,
CCS '07.
[2]
Rajkumar Buyya,et al.
Introduction to Cloud Computing
,
2011,
CloudCom 2011.
[3]
Cong Wang,et al.
Toward publicly auditable secure cloud data storage services
,
2010,
IEEE Network.
[4]
Cong Wang,et al.
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
,
2011,
IEEE Transactions on Parallel and Distributed Systems.
[5]
Cong Wang,et al.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
,
2010,
2010 Proceedings IEEE INFOCOM.
[6]
Sedat Akleylek,et al.
Security requirements for cryptographic modules
,
2013
.
[7]
Rajkumar Buyya,et al.
Cloud Computing Principles and Paradigms
,
2011
.
[8]
William M. Daley,et al.
Security Requirements for Cryptographic Modules
,
1999
.
[9]
Ari Juels,et al.
Pors: proofs of retrievability for large files
,
2007,
CCS '07.