Privacy-Preserving Public Auditing for Secure Cloud Storage
read more
Citations
Data mining with big data
PORs: Proofs of Retrievability for Large Files
Toward Secure and Dependable Storage Services in Cloud Computing
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
Systems and methods of secure data exchange
References
Above the Clouds: A Berkeley View of Cloud Computing
Short Signatures from the Weil Pairing
Provable data possession at untrusted stores
Provable Data Possession at Untrusted Stores.
PORs: Proofs of Retrievability for Large Files
Related Papers (5)
Frequently Asked Questions (12)
Q2. What is the importance of public auditing service for cloud data storage?
To fully ensure the data integrity and save the cloud users’ computation resources as well as online burden, it is of critical importance to enable public auditing service for cloud data storage, so that users may resort to an independent third party auditor (TPA) to audit the outsourced data when needed.
Q3. What is the way to mitigate this privacy concern?
Exploiting data encryption before outsourcing [11] is one way to mitigate this privacy concern, but it is only complementary to the privacypreserving public auditing scheme to be proposed in this paper.
Q4. What is the main drawback of the auditing protocol?
Without a properly designed auditing protocol, encryption itself cannot prevent data from “flowing away” towards external parties during the auditing process.
Q5. What does Shah et al. propose to do?
Shah et al. [9], [14] propose allowing a TPA to keep online storage honestby first encrypting the data then sending a number of pre-computed symmetric-keyed hashes over the encrypted data to the auditor.
Q6. Why does TPA need to combine K verification equations into one?
This is because aggregating K verification equations into one helps reduce the number of relatively expensive pairing operations from 2K , as required in the individual auditing, to K + 1.
Q7. What are the main reasons why the cloud is being viewed as a disruptive technology?
First of all, although the infrastructures under the cloud are much more powerful and reliable than personal computing devices, they are still facing the broad range of both internal and external threats for data integrity.
Q8. What is the main reason why Wang et al. propose to combine BLS-based?
In a subsequent work, Wang et al. [10] propose to combine BLS-based HLA with MHT to support both public auditability and full data dynamics.
Q9. How much time is saved by batch auditing?
It can be shown that compared to individual auditing, batch auditing indeed helps reducing the TPA’s computation cost, as more than 11% and 14% of per-task auditing time is saved, when c is set to be 460 and 300, respectively.
Q10. What is the way to have more error-resiliency?
If the user wants to have more error-resiliency, he/she can always first redundantly encodes the data file and then uses their system with the data file that has error-correcting codes integrated.•
Q11. What is the importance of minimizing the overhead of using cloud storage?
the overhead of using cloud storage should be minimized as much as possible, such that user does not need to perform too many operations to use the data (in additional to retrieving the data).
Q12. What is the cost of auditing the data in a cloud environment?
Considering the large size of the outsourced data and the user’s constrained resource capability, the tasks of auditing the data correctness in a cloud environment can be formidable and expensive for the cloud users [10], [12].