Survey on Cloud Data Integrity Proof Techniques

Proof of Retrievability (POR) and Provable Data Possession (PDP) systems these days are the most active area of research for data integrity check, which is outsourced to cloud service providers. In this work we surveyed data integrity proving schemes by reviewing different schemes in the area along with their efficiency and security considerations. The objective of this survey is to offer a state-of-the-art knowledge for new researchers, who are interested in this specific area, i.e., it helps in understanding the research work carried out for the last few years.

[1]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[2]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[3]  X. U. Chun-xiang,et al.  Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing , 2012, IACR Cryptol. ePrint Arch..

[4]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[5]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[6]  Jean-Jacques Quisquater,et al.  Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.

[7]  Yasuyuki Nogami,et al.  Pairing-based cryptography for homomorphic cryptography , 2014, 2014 International Symposium on Information Theory and its Applications.

[8]  Marten van Dijk,et al.  Iris: a scalable cloud file system with efficient integrity checks , 2012, ACSAC '12.

[9]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[10]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[11]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[12]  Shouhuai Xu,et al.  Fair and dynamic proofs of retrievability , 2011, CODASPY '11.

[13]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[14]  Yevgeniy Dodis,et al.  Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..

[15]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[16]  Ke Zeng,et al.  Publicly Verifiable Remote Data Integrity , 2008, ICICS.

[17]  Sushil Jajodia,et al.  Integrity and Internal Control in Information Systems VI , 2013, IFIP International Federation for Information Processing.

[18]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[19]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[20]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[21]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[22]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[23]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[24]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[25]  Jia Xu,et al.  Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.