Abstract
Cloud computing is a visible or feasible solution to IT industry. It is famed among business owners because it removes the need for users to plan ahead of initiating business. It let the users free to start from scratch and increase their resources only when there is a growth in the business. Though, regardless of the truth that cloud computing offers vast opportunities to enterprises, users need to put their data over the remotely located cloud servers and lose their control over data after storing on cloud. Consequently, security and integrity of data that users put over the cloud are the foremost concern of cloud computing. Occasionally, cloud service provider (CSP) can tamper or delete the data which is not used by the users from a long time or engaged large memory space. So, there is a demand to verify the data from time to time, to maintain its integrity. Examining data to check the correctness of data is called data integrity. To conquer the problem of data integrity, various techniques are proposed underneath different systems and privacy models. This paper covers various data integrity proving techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Asma, A., Mousmi, Chaurasia, A.: Cloud computing security Issues. Int. J. Appl. Innov. Eng. Manage. 1(2), 141–147 (2012)
Addossary, S., Allen, W.: Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 7(4) (2016)
Kandukuri, B.R., Ramakrishna Paturi V., Rakshit, A.: Cloud security issues. In: Proceedings of the 2009 IEEE International Conference on Services Computing, pp 517–520 (2009)
Wang, C., Wang, Q., Ren, K., Lou, W.A.: Ensuring data storage security in Cloud Computing. In: 17th International Workshop on Quality of Service (2009)
Eswaran, S., Abburu, S.: Identifying data integrity in the cloud storage. Int. J. Comput. Sci. Iss. 9(2), 403–408 (2012)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.: Provable data possession at untrusted stores. In: CCS’07: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2009)
Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks—SecureComm, pp. 1–10 (2008)
Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17(4), 1–29 (2015)
Giri, M.S., Gaur, B., Tomar, D.: A survey on data integrity techniques in cloud computing. Int. J. Comput. Appl. 122(2), 27–32 (2015)
Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)
Juels, A., KaliskiJr, B.S.: PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security—CCS, pp 584–597 (2007)
Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of 16th ACM Conference on Computer and Communications Security, pp. 187–198 (2009)
Yuan, J., Yu, S., Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Proceedings of the International Workshop on Security in Cloud Computing, pp. 19–26 (2013)
Sravankumar, R., Saxena.: Data integrity proofs in cloud storage. J. IEEE Trans. Comput. 62(2), 362–375 (2013)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT, vol. 5350, pp. 90–107. LNCS Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Thakur, N., Singh, A., Sangal, A.L. (2020). Data Integrity Authentication Techniques in Cloud Computing: A Survey. In: Pant, M., Sharma, T., Verma, O., Singla, R., Sikander, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1053. Springer, Singapore. https://doi.org/10.1007/978-981-15-0751-9_115
Download citation
DOI: https://doi.org/10.1007/978-981-15-0751-9_115
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0750-2
Online ISBN: 978-981-15-0751-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)