A review on public auditing in cloud environment

M. Thangavel, P. Varalakshmi, T. Preethi, S. Renganayaki, G. R. Subhapriya, A. Zeenath Banu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Nowadays, Cloud storage helps the users to remotely store and access the data. Any modification or corruption in data by unauthorized users will lead to insecure cloud framework. Protecting the users data from unauthorized access or malicious attacks in cloud is one of the major research direction to address the issues of data privacy and integrity in cloud. Ensuring cloud data integrity and privacy seems to be the major issue. Inorder to overcome unauthorized access of users data even by Cloud Service Provider (CSP), Data integrity verification is performed through Trusted Third Party Auditor (TTPA). By TTPA, the cloud data auditing need to be performed and data security need to be ensured, without the knowledge of the actual data stored in cloud. Many researchers had keen interest to provide a cloud framework, which preserves the privacy and ensures the integrity of cloud data. In this paper, various researcher ideas based on privacy preservation public auditing schemes has been analyzed as an literature review.

Original languageEnglish
Title of host publication2016 International Conference on Information Communication and Embedded Systems, ICICES 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509013524
DOIs
Publication statusPublished - Jul 21 2016
Externally publishedYes
Event2016 International Conference on Information Communication and Embedded Systems, ICICES 2016 - Chenai, Tamilnadu, India
Duration: Feb 25 2016Feb 26 2016

Publication series

Name2016 International Conference on Information Communication and Embedded Systems, ICICES 2016

Conference

Conference2016 International Conference on Information Communication and Embedded Systems, ICICES 2016
Country/TerritoryIndia
CityChenai, Tamilnadu
Period2/25/162/26/16

Keywords

  • Cloud Computing
  • Integrity
  • Privacy
  • Trusted Third Party Auditor
  • Unauthorized access

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Signal Processing

Fingerprint

Dive into the research topics of 'A review on public auditing in cloud environment'. Together they form a unique fingerprint.

Cite this