Computer Science ›› 2017, Vol. 44 ›› Issue (6): 8-16.doi: 10.11896/j.issn.1002-137X.2017.06.002

Previous Articles     Next Articles

Research and Development of Auditing Techniques for Cloud Data Possession

TIAN Hui, CHEN Yu-xiang, HUANG Yong-feng and LU Jing   

  • Online:2018-11-13 Published:2018-11-13

Abstract: As an important branch of cloud computing,cloud storage possesses the advantages of low-cost and high-performance,and has attracted a growing number of organizations and individuals to outsource their data.However,due to the outsourcing characteristic of cloud data and frequent security accidents for cloud storage providers,users are lacking of confidence in the cloud storage server,of which the main problem is how to effectively check the integrity of cloud data.To overcome this challenge,the auditing for cloud data possession has been proposed and gotten widespread attention in recent years,and a comprehensive survey was provided in this paper.First,general models and design goals of the auditing for cloud data possession were reviewed.Second,the existing auditing schemes for cloud data possession were classified according to their auditing functions,their principles were analyzed,and their performances were compared.Finally,the open problems in the auditing for cloud data possession were identified,and the trends of future development were discussed.

Key words: Cloud storage,Provable data possession,Public auditing,Cloud security

[1] DEWAN H,HANSDAH R C.A Survey of Cloud Storage Facilities[C]∥Proceedings of the 7th IEEE World Congress on Servi-ces.2011:224-231.
[2] WANG C,WANG Q,REN K,et al.Toward Secure and Depen- dable Storage Services in Cloud Computing [J].IEEE Transactions on Services Computing,2012,5(2):220-232.
[3] Digital in 2008.Amazon S3 Availability Event .http://status.aws.amazon.com/s3-20080720.html.
[4] Digital in 2006.Reports of Mass Email Deletions .http://www.techcrunch.com/2006/12/28/gmail-disaster-reports-of-ma-ssemail-deletions.
[5] Digital in 2014.iCloud被黑客攻击而泄密 引发“公有云”恐慌 .http://www.chinacloud.cn/show.aspx?id=17748&cid=29.
[6] FENG C S,QIN Z G,YUAN D.Techniques of Secure Storage for Cloud Data [J].Chinese Journal of Computers,2015,8(1):150-163(in Chinese) 冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报,2015,8(1):150-163.
[7] TAN S,JIA Y,HAN W H.Research and Development of Prova-ble Data Integrity of Cloud Storage[J].Chinese Journal of Computers,2015,8(1):164-177.(in Chinese) 谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展 [J].计算机学报,2015,8(1):164-177.
[8] CHEN L X,XU L.Research on Provable Data Possession and Recovery Technology in Cloud Storage [J].Journal of Computer Research and Development,2012,9(S1):19-25.(in Chinese) 陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,9(S1):19-25.
[9] WANG C,REN K,LOU W J,et al.Toward Publicly Auditable Secure Cloud Data Storage Services [J].IEEE Network,2010,4(4):19-24.
[10] YANG K,JIA X H.Data Storage Auditing Service in CloudComputing:Challenges,Methods and Opportunities [J].World Wide Web-internet & Web Information Systems,2012,5(4):409-428.
[11] SOOKHAK M,GANI A,TALEBAIN H,et al.Remote DataAuditing in Cloud Computing Environments:A Survey, Taxono-my,and Open Issues [J].ACM Computing Surveys,2015,7(4):65.
[12] SOOKHAK M,TALEBAIN H,AHMED E,et al.A Review on Remote Data Auditing in Single Cloud Server:Taxonomy and Open Issues [J].Journal of Network & Computer Applications,2014,3(5):121-141.
[13] RYOO J,RIZVI S,AIKEN W,et al.Cloud Security Auditing:Challenges and Emerging Approaches [J].IEEE Security & Privacy,2014,2(6):68-74.
[14] SEB F,DOMINGO-FERRER J,M ARTNEZ-BALLEST A,et al.Efficient Remote Data Possession Checking in Critical Information Infrastructures [J].IEEE Transactions on Knowledge and Data Engeering,2008,0(8):1034-1038.
[15] JUELS A,KALISKI J R B S.PoRs:Proofs of Retrievability for Large Files [C]∥Proceedings of the 14th ACM Conference Computer and Communications Security.2007:584-597.
[16] SHACHAM H,WATERS B.Compact Proofs of Retrievability [C]∥Proceedings of the 14th Theory and Application of Cryptology and Information Security:Advances in Cryptology.2008:90-107.
[17] ATENIESE G,PIETRO R D,MANCINI L V,et al.Scalable and efficient provable data possession [C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.2008:1-10.
[18] ATENIESE G,JOHNS R B,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores [C]∥Proceedings of the 14th Computer and Communications Security.2007:598-609.
[19] WANG H.Proxy Provable Data Possession in Public Clouds[J].IEEE Transactions on Services Computing,2013,6(4):551-559.
[20] WANG B Y,LI B C,LI H,et al.Certificateless Public Auditing for Data Integrity in the Cloud [C]∥Proceedings of the IEEE Conference on Communications and Network Security.2013:136-144.
[21] WANG H K,WU Q H,QIN Bo,et al.Identity-based Remote Data Possession Checking in Public Clouds [J].IET Information Security,2014,8(2):114-121.
[22] YU J,REN K,WANG C,et al.Enabling Cloud Storage Auditingwith Key-Exposure Resistance [J].IEEE Transactions on Information Forensics and Security,2015,0(6):1167-1180.
[23] LIU C,RAJIV R,ZHANG X Y,et al.Public Auditing for Big Data Storage in Cloud Computing--A Survey [C]∥Proceedings of the 16th IEEE International Conference on Computational Science and Engineering.2013:1128-1135.
[24] WANG C,WANG Q,REN K,et al.Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing [C]∥Proceedings of the 29th IEEE International Conference on Computer Communications.2010:1-9.
[25] WANG C,CHOW S,WANG Q,et al.Privacy-Preserving Public Auditing for Secure Cloud Storage [J].IEEE Transactions on Computers,2013,2(2):362-375.
[26] ZHU Y,HU H X,GAIL-JOON A,et al.Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Sto-rage[J].IEEE Transactions on Parallel and Distributed Systems,2012,3(12):2231-2244.
[27] YANG K,JIA X H.An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing [J].IEEE Tran-sactions on Parallel and Distributed Systems,2013,4(9):1717-1726.
[28] CURTMOLA R,KHAN O,BURNS R C,et al.MR-PDP:Multiple-Replica Provable Data Possession [C]∥Proceedings of the 28th IEEE International Conference on Distributed Computing Systems.2008:411-420.
[29] HAO Z,YU N H.A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability[C]∥Proceedings of the 2nd IEEE International Symposium on Data,Privacy and E-Commerce.2010:84-89.
[30] XIAO D,YANG Y,YAO W B,et al.Multiple-File Remote Data Checking for Cloud Storage [J].Computers & Security,2012,1(2):192-205.
[31] BARSOUM A F,HASAN M A.On Verifying Dynamic Multiple Data Copies over Cloud Servers .http:/cacr.uwaterloo.ca/techreports/2011/cacr2011-28.pdf.
[32] CHEN H F,LIN B G,YANG Y,et al.Public Batch Auditing for 2M-PDP Based on BLS in Cloud Storage [J].Journal of Cryptologic Research,2014,1(4):368-378.
[33] ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic Provable Data Possession [C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.2009:213-222.
[34] WANG Q,WANG C,REN K,et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [J].IEEE Transactions on Parallel and Distributed Systems,2011,2(5):847-859.
[35] LIU C,ZHANG X,CHI Y,et al.Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates [J].IEEE Transactions on Parallel and Distributed Systems,2014,5(9):2234-2244.
[36] ZHU Y,AHN G J,HU H X,et al.Dynamic Audit Services for Outsourced Storage in Clouds [J].IEEE Transactions on Servi-ces Computing,2013,6(2):227-238.
[37] JIN H,JIANG H,ZHOU K.Dynamic and Public Auditing with Fair Arbitration for Cloud Data [C]∥IEEE Transactions on Cloud Computing.2016:1.
[38] TIAN H,CHEN Y X,CHANG C C,et al.Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage[C]∥IEEE Transactions on Services Computing.2016:1.
[39] LIU C,RAJIV R J,YANG C,et al.MuR-DPA:Top-down Leve- led Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud [J].IEEE Transactions on Computers,2015,4(9):2609-2622.
[40] BARSOUM A F,HASAN M A.Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].IEEE Transactions on Information Forensics & Security,2015,0(3):485-496.
[41] WANG B Y,LI H,LI M.Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics [C]∥Procee-dings of the IEEE International Conference Communication.2013:539-543.
[42] WANG B Y,CHOW S,LI M,et al.Storing Shared Data on the Cloud via Security-Mediator [C]∥Proceedings of the 33rd IEEE International Conference on Distributed Computing Systems.2013:124-133.
[43] WANG B Y,LI B C,LI H.Knox:Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud [C]∥Procee-dings of the 10th International Conference on Applied Cryptography and Network Security.2012:507-525.
[44] WANG B Y,LI B C,LI H.Oruta:Privacy-Preserving Public Auditing for Shared Data in the Cloud [J].IEEE Transactions on Cloud Computing,2014,2(1):43-56.
[45] WANG B Y,LI B C,LI H.Panda:Public Auditing for Shared Data with Efficient User Revocation in the Cloud [J].IEEE Transactions on Services Computing,2015,8(1):92-106.
[46] YU Y,LI Y N.Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification [J].IEEE Transactions on Information Forensics & Security,2015,0(8):1717-1726.
[47] LUO Y C.Efficient Integrity Auditing for Shared Data in theCloud with Secure User Revocation [C]∥Proceedings of the IEEE Trustcom /BigDataSE/ISPA.2015:434-442.
[48] JOHNSON R,MOLNAR D,SONG D,et al.Homomorphic Signature Schemes [C]∥Proceedings of the Cryptographers’ Track at the RSA Conference.2002:244-262.
[49] BONEH D,GENTRY C,LYNN B,et al.Aggregate and Verifia-bly Encrypted Signatures from Bilinear Maps [C]∥ Procee-dings of the 22nd Theory and Applications of Cryptographic Techniques.2003:416-423.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!