Abstract
Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of Cloud Server (CS) brings many challenges related to security and trust. Public auditing is one process that enables users to delegate the integrity verification of outsourced data to external party such as Third-Party Auditor (TPA). Provable Data Possession (PDP) is one approach of auditing that can verify the integrity using cryptographic algorithms. Many PDP schemes are based on bilinear pairing and homomorphic authenticators that involves complex computations that leads to increased verification time. The lightweight auditing processes is a need today using modern cryptographic techniques. Indistinguishability Obfuscation (IO) is one of the modern but weaker primitive that, if used with one-way functions, provide multiple cryptographic constructs. Sahai and Waters proposed construction of cryptographic constructs using IO. Zhang <i>et al.</i> proposed lightweight public auditing scheme using these IO. But still there are many goals to achieve such as group support, collusion handling, privacy-preserving etc. using IO. In this paper, we are trying to explore these issues and lists future research directions in this field.
Highlights
Evolution in the field of computer technology and Internet- Cloud Server (CS) may delete infrequent data to create space based services open up the era of Cloud Computing
Initially we presented an overview of multiple cryptographic techniques to achieve goals of public auditing system
We came to know that with the use of Indistinguishability Obfuscation (IO), auditing time is greatly reduced
Summary
Centers since user is not having any physical control over it. Evolution in the field of computer technology and Internet- Cloud Server (CS) may delete infrequent data to create space based services open up the era of Cloud Computing. Flexible and increased network bandwidth enables a client to data and resource capacity access or subscribe to data and services from remote data constraints on user side, it is not efficient for cloud user to centers. This improved computing architecture helps many conduct periodic integrity checks [1]. Without any investment in infrastructure and maintenance Evidence generated through different logs is used to solve costs This paradigm mainly provides services in computing disputes between cloud user and CS [2]. Multiple computing resources are auditing faces many challenges such as: increased growth in assigned and released to cloud users based on their needs.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.