Abstract

AbstractThe management of vast volumes of data with cloud service providers (CSPs) poses data privacy issues. Data confidentiality and privacy could be lost due to cloud administrator, malware, deceptive cloud providers, or other malicious users who may manipulate the data physically transferring the data from one location to another. Hence, corrections to saved data must be reviewed at regular intervals. Cryptography, remote (cloud) data verification, is carried out by third-party auditors (TPAs). Also ideal for public auditing are TPAs, which provide audit services with more efficient analytical and communication capabilities than standard users. Our work focuses on cryptographic algorithms for cloud data auditing and the problems surrounding the validity and privacy of these algorithms. Many approaches to preserving confidentiality and privacy have been suggested in the literature; they are usually categorized according to the different states of the data: static, dynamic, multi-owner, multi-user, etc. KeywordsCryptographyCloud Service Providers (CSPs)Third - Party Auditors (TPAs)Homomorphic authentication

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call