A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor

Built on the fundamental concepts of grid, cluster & distributed computing and following the evolution from mainframe computers to client/server models, Cloud computing is a novel paradigm where computing resources are provisioned on demand. By outsourcing computing and storage requirements to Cloud, user enjoys numerous benefits, such as cost saving through pay for you use model, flexibility & scalability, to name a few. But, as the data stored on the cloud is not under the direct possession of the user, many new security challenges are to be addressed. Data integrity issue is one of them where client's data may be tampered by unauthorized entities, or sometimes by the cloud service provider, intentionally or accidentally. Proposed approaches for data integrity verification fall under two broad categories, first which makes use of Trusted Third Party Auditor (TTPA) and other which does not exercise TTPA. In this work, we make an exhaustive review of several recently proposed schemes which utilize TTPA.

[1]  T. Grance,et al.  SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .

[2]  R. Subramanian,et al.  Ensuring data storage security in cloud computing using Sobol Sequence , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[3]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[4]  Ge Cheng,et al.  Sealed storage for trusted cloud computing , 2010, 2010 International Conference On Computer Design and Applications.

[5]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[6]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[8]  Siani Pearson,et al.  A Privacy Manager for Cloud Computing , 2009, CloudCom.

[9]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[10]  Junfeng Tian,et al.  A Trusted Control Model of Cloud Storage , 2012, 2012 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring.

[11]  Athanasios V. Vasilakos,et al.  SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[12]  Stephen S. Yau,et al.  Efficient audit service outsourcing for data integrity in clouds , 2012, J. Syst. Softw..

[13]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[14]  Subhash Chand Gupta,et al.  ENSURING DATA INTEGRITY IN CLOUD DATA STORAGE , 2014 .

[15]  M. Roberts Masillamani,et al.  Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.

[16]  Shuai Han,et al.  Ensuring data storage security through a novel third party auditor scheme in cloud computing , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[17]  Mary Baker,et al.  Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..

[18]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[19]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[20]  Dimitris Gritzalis,et al.  Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation , 2011, TrustBus.

[21]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[22]  C Praveen Ram,et al.  Security as a Service (SasS): Securing user data by coprocessor and distributing the data , 2010, Trendz in Information Sciences & Computing(TISC2010).