Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing

Now-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the internet based computing which provides users with a number of services. Users store their data in the cloud without the burden of local data storage. As the user no longer have physical possession of data so the integrity and security of data become the major concern in the cloud computing. Data stored on the cloud server may be get corrupted and sometimes even the cloud service provider for his own benefit like for more space on data centre can discard the user data which is not used for a longer time. In order to maintain the integrity of data, the user takes the assistance of a Third Party Auditor (TPA). The TPA checks the integrity of data on user demand and the released audit reports help the user to evaluate the risk of their services. TPA have an experience that user does not have and have capability to check integrity of data which is not easy for the user to check. This paper highlighted the basics of cloud computing, general model and different approaches used for TPA.

[1]  T. K. Chakraborty,et al.  Enhanced public auditability & secure data storage in cloud computing , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[2]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[3]  Shuai Han,et al.  Ensuring data storage security through a novel third party auditor scheme in cloud computing , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[4]  Shufen Zhang,et al.  Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.

[5]  Akhil Behl Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.

[6]  A. Kartit,et al.  A taxonomy and survey of Cloud computing , 2013, 2013 National Security Days (JNS3).

[7]  S. S. Islam,et al.  Next generation of computing through cloud computing technology , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[8]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[9]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[10]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[11]  Stephen S. Yau,et al.  Efficient audit service outsourcing for data integrity in clouds , 2012, J. Syst. Softw..

[12]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[13]  Dalia Attas,et al.  Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing , 2011 .

[14]  Bhavna Makhija,et al.  Enhanced Data Security in Cloud Computing with Third Party Auditor , 2013 .

[15]  Kirit J. Modi,et al.  Cloud computing - concepts, architecture and challenges , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[16]  Sukhvinder Kaur,et al.  Implementation of Effective Third Party Auditing for Data Security in Cloud , 2015 .

[17]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[18]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[19]  M. Roberts Masillamani,et al.  Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.

[20]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[21]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[22]  R. Subramanian,et al.  Ensuring data storage security in cloud computing using Sobol Sequence , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[23]  Shobana,et al.  Introducing Effective Third Party Auditing ( TPA ) for Data Storage Security in Cloud , .

[24]  Jun-jie Wang,et al.  Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.

[25]  Muneshwara M.S,et al.  Monitoring the integrity of Dynamic Data stored in Cloud Computing , 2012 .

[26]  T. A. Chavan,et al.  A survey on Privacy Preserving Public Auditing for Data Storage Security , 2013 .

[27]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[28]  Subhash Chand Gupta,et al.  ENSURING DATA INTEGRITY IN CLOUD DATA STORAGE , 2014 .