Abstract

Remote Data Integrity Checking (RDIC) is crucial for implementing secure cloud storage. It enables the users to check the integrity of the outsourced data without downloading the entire data. As a solution to this, some RDIC protocols have been proposed by many researchers. Most of the existing RDIC protocols are designed based on Public Key Infrastructure (PKI) and ID-Based Cryptography (IBC). However, each protocol has its own advantages and disadvantages. This paper presents a detailed study on RDIC protocols in a cloud environment and discusses the taxonomy of RDIC protocols such as Provable Data Possession (PDP), Proof of Retrievability (POR), Proof of Ownership (POW) and ID-based RDIC protocols. We also analysze and compares the existing RDIC approaches based on the parameters such as integrity checking method, cryptographic model, auditing mode and data recovery. Finally, it throws light on the open issues such as research directions in designing RDIC protocol.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call