Abstract

Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of Cloud Server (CS) brings many challenges related to security and trust. Public auditing is one process that enables users to delegate the integrity verification of outsourced data to external party such as Third-Party Auditor (TPA). Provable Data Possession (PDP) is one approach of auditing that can verify the integrity using cryptographic algorithms. Many PDP schemes are based on bilinear pairing and homomorphic authenticators that involves complex computations that leads to increased verification time. The lightweight auditing processes is a need today using modern cryptographic techniques. Indistinguishability Obfuscation (IO) is one of the modern but weaker primitive that, if used with one-way functions, provide multiple cryptographic constructs. Sahai and Waters proposed construction of cryptographic constructs using IO. Zhang <i>et al.</i> proposed lightweight public auditing scheme using these IO. But still there are many goals to achieve such as group support, collusion handling, privacy-preserving etc. using IO. In this paper, we are trying to explore these issues and lists future research directions in this field.

Highlights

  • Evolution in the field of computer technology and Internet- Cloud Server (CS) may delete infrequent data to create space based services open up the era of Cloud Computing

  • Initially we presented an overview of multiple cryptographic techniques to achieve goals of public auditing system

  • We came to know that with the use of Indistinguishability Obfuscation (IO), auditing time is greatly reduced

Read more

Summary

INTRODUCTION

Centers since user is not having any physical control over it. Evolution in the field of computer technology and Internet- Cloud Server (CS) may delete infrequent data to create space based services open up the era of Cloud Computing. Flexible and increased network bandwidth enables a client to data and resource capacity access or subscribe to data and services from remote data constraints on user side, it is not efficient for cloud user to centers. This improved computing architecture helps many conduct periodic integrity checks [1]. Without any investment in infrastructure and maintenance Evidence generated through different logs is used to solve costs This paradigm mainly provides services in computing disputes between cloud user and CS [2]. Multiple computing resources are auditing faces many challenges such as: increased growth in assigned and released to cloud users based on their needs.

GENERAL STRATEGIES OF INTEGRITY VERIFICATION FOR CLOUD STORAGE
Lightweight
Proxy Re-Signature with
LIGHTWEIGHT PDP USING IO
NEW CHALLENGES AND RECOMMENDATIONS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call