Title :
Auditing Protocols for Cloud Storage: A Survey
Author :
Jun Shen;Sai Ji;Jian Shen;Zhangjie Fu;Jin Wang
Author_Institution :
Jiansu Eng. Center of Network Monitoring, Nanjing Univ. of Inf. Sci. &
Abstract :
So far, cloud storage has been accepted by an increasing number of people, which is not a fresh notion any more. It brings cloud users a lot of conveniences, such as the relief of local storage and location independent access. Nevertheless, the correctness and completeness as well as the privacy of outsourced data are what worry could users. As a result, most people are unwilling to store data in the cloud, in case that the sensitive information concerning something important is disclosed. Only when people feel worry-free, can they accept cloud storage more easily. Certainly, many experts have taken this problem into consideration, and tried to solve it. In this paper, we survey the solutions to the problems concerning auditing in cloud computing and give a comparison of them. The methods and performances as well as the pros and cons are discussed for the state-of-the-art auditing protocols.
Keywords :
"Cloud computing","Protocols","Data models","Computational modeling","Security","Information science","Scalability"
Conference_Titel :
Computational Intelligence Theory, Systems and Applications (CCITSA), 2015 First International Conference on
DOI :
10.1109/CCITSA.2015.51