Privacy Preserving Public Auditing in Cloud: Literature Review

Privacy Preserving Public Auditing in Cloud: Literature Review

Thangavel M., Varalakshmi P., Sridhar S., Sindhuja R.
Copyright: © 2019 |Pages: 25
ISBN13: 9781522581765|ISBN10: 1522581766|EISBN13: 9781522581772
DOI: 10.4018/978-1-5225-8176-5.ch100
Cite Chapter Cite Chapter

MLA

Thangavel M., et al. "Privacy Preserving Public Auditing in Cloud: Literature Review." Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 2059-2083. https://doi.org/10.4018/978-1-5225-8176-5.ch100

APA

Thangavel M., P., V., Sridhar S., & Sindhuja R. (2019). Privacy Preserving Public Auditing in Cloud: Literature Review. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 2059-2083). IGI Global. https://doi.org/10.4018/978-1-5225-8176-5.ch100

Chicago

Thangavel M., et al. "Privacy Preserving Public Auditing in Cloud: Literature Review." In Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 2059-2083. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8176-5.ch100

Export Reference

Mendeley
Favorite

Abstract

Cloud computing has given a bloom to the technical world by providing various services. Data storage is the essential factor for the users who are having or working with lots and lots of data. Cloud data storage becomes the only way to store and maintain the large data, which can be accessed from anywhere and anytime. The open nature of cloud computing leads to some security issues. With respect to the cloud data storage, the Cloud Service Provider (CSP) has to provide security for the data outsourced. Data owner will be concerned on the data correctness after outsourcing into the cloud. To verify the data correctness, ensuring the state of data at the cloud data storage is needed, which is performed with the help of a Trusted Third Party Auditor (TTPA). Data owner can also perform the verification task, but it leads to computation cost and communication costs in huge amount. This survey gives a brief on public auditing schemes to explore what are all the system models designed by various researchers.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.