Abstract

Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC’s data in the cloud, several security paradigms of cloud computing based on a third-party auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC’s data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC’s data by playing a malicious role. In this paper, we present the state of the art of cloud computing’s privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance are discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA’s privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement.

Highlights

  • Cloud computing is considered as a utility-driven paradigm derived from a “pay as you use” concept responsible for enabling consumers to remotely share technology-based resources instead of possessing these resources locally [1,2].Cloud computing transports a reliable, custom-made information technology (IT) perimeter for cloud users with an ensured quality of service

  • The third-party auditor (TPA) can be trusted by both cloud clients and cloud providers to evaluate the security level of cloud service providersÕ storage; the data can be marked as protected against malicious attempts, Byzantine failures, data alteration attacks, and even server colluding attacks [10]

  • Ten articles were used to write the introduction section, 11 were related to the existing reviews/surveys on the security of cloud computing, 16 articles were related to the security requirements, vulnerabilities, and threats, and 37 articles were used to describe the recapitulation of TPA studied methods including privacy-preserving models (PPM)

Read more

Summary

Introduction

Cloud computing is considered as a utility-driven paradigm derived from a “pay as you use” concept responsible for enabling consumers to remotely share technology-based resources instead of possessing these resources locally [1,2]. The hybrid cloud combines two or more delivery models This model can be applicable to cloud users who would like to retain their most crucial data on-premises while storing their fundamental data on the cloud. The combined delivery models can be private-, public-, or community-based models; a standardized technology can be utilized to bound the data. Data security, privacy, and safety are fundamental measures which establish the trust level between the cloud clients and cloud providers. The TPA can be trusted by both cloud clients and cloud providers to evaluate the security level of cloud service providersÕ storage; the data can be marked as protected against malicious attempts, Byzantine failures, data alteration attacks, and even server colluding attacks [10]. This survey investigates TPA privacy-preserving models’ characteristics and the security issues that TPAs suffer from

Research Contribution
Paper Organization
Research Methodology
Summary
Loss of Control
Method
Privacy-Preserving Public Auditing for Shared Cloud Data
5.1.11. Based on the Proxy Re-Signature Scheme
Novel Third Party Auditor Scheme
Optimized Proof of Retrievability Scheme
Audit and Feedback Scheme Securing the Cloud Storage Audit Scheme
Based on Bilinearity Property
Based on Encryption and Secret Key
TPA-Based Security Challenges and Recommendations
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.