Abstract

In this paper, various protocols for data integrity auditing in cloud computing have been analyzed. The system models and threat models for data integrity auditing have been presented. Brief reviews on mathematical and cryptographic methods used to devise data integrity auditing protocols have been done. A comparative analysis of existing data integrity auditing protocols chronologically first, based on development methods is presented. Further, a specific analysis based on security methods, storage overheads, computation cost and communication cost is comprehended and presented in tabulated form. A comprehensive view of desirable properties of these protocols is presented later. Finally, the challenges in the composition of a dynamic data integrity auditing protocol for cloud computing environment have been highlighted.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call