Skip to main content

Data Integrity Authentication Techniques in Cloud Computing: A Survey

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1053))

Abstract

Cloud computing is a visible or feasible solution to IT industry. It is famed among business owners because it removes the need for users to plan ahead of initiating business. It let the users free to start from scratch and increase their resources only when there is a growth in the business. Though, regardless of the truth that cloud computing offers vast opportunities to enterprises, users need to put their data over the remotely located cloud servers and lose their control over data after storing on cloud. Consequently, security and integrity of data that users put over the cloud are the foremost concern of cloud computing. Occasionally, cloud service provider (CSP) can tamper or delete the data which is not used by the users from a long time or engaged large memory space. So, there is a demand to verify the data from time to time, to maintain its integrity. Examining data to check the correctness of data is called data integrity. To conquer the problem of data integrity, various techniques are proposed underneath different systems and privacy models. This paper covers various data integrity proving techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Asma, A., Mousmi, Chaurasia, A.: Cloud computing security Issues. Int. J. Appl. Innov. Eng. Manage. 1(2), 141–147 (2012)

    Google Scholar 

  2. Addossary, S., Allen, W.: Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 7(4) (2016)

    Google Scholar 

  3. Kandukuri, B.R., Ramakrishna Paturi V., Rakshit, A.: Cloud security issues. In: Proceedings of the 2009 IEEE International Conference on Services Computing, pp 517–520 (2009)

    Google Scholar 

  4. Wang, C., Wang, Q., Ren, K., Lou, W.A.: Ensuring data storage security in Cloud Computing. In: 17th International Workshop on Quality of Service (2009)

    Google Scholar 

  5. Eswaran, S., Abburu, S.: Identifying data integrity in the cloud storage. Int. J. Comput. Sci. Iss. 9(2), 403–408 (2012)

    Google Scholar 

  6. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.: Provable data possession at untrusted stores. In: CCS’07: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)

    Google Scholar 

  7. Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2009)

    Google Scholar 

  8. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks—SecureComm, pp. 1–10 (2008)

    Google Scholar 

  9. Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17(4), 1–29 (2015)

    Google Scholar 

  10. Giri, M.S., Gaur, B., Tomar, D.: A survey on data integrity techniques in cloud computing. Int. J. Comput. Appl. 122(2), 27–32 (2015)

    Google Scholar 

  11. Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)

    Google Scholar 

  12. Juels, A., KaliskiJr, B.S.: PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security—CCS, pp 584–597 (2007)

    Google Scholar 

  13. Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of 16th ACM Conference on Computer and Communications Security, pp. 187–198 (2009)

    Google Scholar 

  14. Yuan, J., Yu, S., Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Proceedings of the International Workshop on Security in Cloud Computing, pp. 19–26 (2013)

    Google Scholar 

  15. Sravankumar, R., Saxena.: Data integrity proofs in cloud storage. J. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Google Scholar 

  16. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT, vol. 5350, pp. 90–107. LNCS Springer, Heidelberg (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha Thakur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thakur, N., Singh, A., Sangal, A.L. (2020). Data Integrity Authentication Techniques in Cloud Computing: A Survey. In: Pant, M., Sharma, T., Verma, O., Singla, R., Sikander, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1053. Springer, Singapore. https://doi.org/10.1007/978-981-15-0751-9_115

Download citation

Publish with us

Policies and ethics