Abstract
The auditing services of the outsourced data, especially big data, have been an active research area recently. Many schemes of remotely data auditing (RDA) have been proposed. Both categories of RDA, which are Provable Data Possession (PDP) and Proof of Retrievability (PoR), mostly represent the core schemes for most researchers to derive new schemes that support additional capabilities such as batch and dynamic auditing. In this paper, we choose the most popular PDP schemes to be investigated due to the existence of many PDP techniques which are further improved to achieve efficient integrity verification. We firstly review the work of literature to form the required knowledge about the auditing services and related schemes. Secondly, we specify a methodology to be adhered to attain the research goals. Then, we define each selected PDP scheme and the auditing properties to be used to compare between the chosen schemes. Therefore, we decide, if possible, which scheme is optimal in handling big data auditing.
Highlights
Big data “is a set of techniques and technologies that require new forms of integration to uncover large hidden values from large datasets that are diverse, complex, and of a massive scale” [Hashem et al.,2015]
The proliferation of Provable Data Possession (PDP) schemes makes it worthy to have a paper that includes a structured comparison clarifies the significant differences among these schemes
We conduct a comparison between PDP schemes in terms of the auditing properties in order to come up with an optimal scheme that can handle big data auditing efficiently
Summary
Big data “is a set of techniques and technologies that require new forms of integration to uncover large hidden values from large datasets that are diverse, complex, and of a massive scale” [Hashem et al.,2015] It represents a gold mine for businesses with the patterns and trends hidden in it [Hashem et al, 2015]. Some cloud service providers could act unfaithfully to maintain a reputation They can hide the data loss incidents or delete rarely accessed data for monetary reasons without user’s permission. The proliferation of PDP schemes makes it worthy to have a paper that includes a structured comparison clarifies the significant differences among these schemes. Such a contribution will assist to have a complete view of the chosen PDP schemes related to specific auditing features. We introduce the work to be achieved in future to enhance the proposed comparison
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.