Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Review on Secure Proof of Retrievability  
  Authors : Saurabhee Wandhekar; Aradhana Deshmukh
  Cite as:

 

Moving user data on cloud provides convenience and avoids the complexity and hardware management for the user. However, the cloud concept brings many challenges which influence the system on various factors such as usability, security, reliability, scalability and overall system performance. User who is storing the data on cloud server has to check the integrity of the data which becomes an overhead every time. This task is outsourced to another public auditor. These parties may not be trustworthy. To mitigate this possibility and to alleviate the integrity checking and computation overhead we proposed a system. Proposed system does the integrity checking and preserves the privacy of the data from the Third Party Auditor.

 

Published In : IJCSN Journal Volume 5, Issue 3

Date of Publication : June 2016

Pages : 509-512

Figures :01

Tables : --

Publication Link : Review on Secure Proof of Retrievability

 

 

 

Saurabhee Wandhekar : received the Bachelors degree in Computer Engineering and currently pursuing Masters degree in Computer Engineering both from Savitribai Phule Pune University.Her research interests include cloud computing.

Aradhana Deshmukh : received M.E., M.A. (Economics), Ph.D (pursing).Shehas an excellent academic background. She has almost 11years of teaching experience. She is currently working as Assistant Professor in the Department of computer Engineering, STES’s, Smt. Kashibai Nawale College of Engineering, Pune. She has published 81 papers in Internationl Journals, Conferences. She has received Gold Medal at International level Paper Presentationon ‘UWB Technology based Adhoc Network’, received ‘Gunawant Nagrik Puraskar’for the year 2004-2005, ‘Anushka Purskar’ form Pimpari ChinchwadMunicipal Corporation, Pune. She was elected from Computer Engineering division in Institution of Engineers (India) continuously from 2002 to 2014. She is a member of Computer, Society of India (CSI), Member IAENG, Hongkong, Member UACEA, USA.

 

 

 

 

 

 

 

Cloud Storage, Integrity, Proof of Retrievability [POR], Public Auditing.

This paper describes importance of the cloud for storage, challenges in using cloud as storage and prior works to solve those challenges. Paper addressed the lack of privacy preservation in existing system and proposed a system which provides Public Integrity verification, Privacy from public auditor and cloud storage server, Dynamic Data modification.

 

 

 

 

 

 

 

 

 

[1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Comput. Commun. Security, 2007, pp. 598–609. 1 [2] A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in Proc. 14th ACM Conf. Comput. Commun. Security, 2007, pp. 584–597. 2 [3] L. V. M. Giuseppe Ateniese, R. D. Pietro, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. Int. Conf. Security Privacy Commun. Netw., 2008, pp. 46–66. 11 [4] H. Shacham and B. Waters, “Compact proofs of retrievability” in Proc. 14th Int. Conf Theory Appl Cryptol. Inf. Security, 2008, [5] C. Wang, Q. Wang, and K. Ren, “Ensuring data storage security in cloud computing,” in Proc. 17th Int. Workshop Quality Serv., 2009, pp. 1–9. 22 [6] Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, and Fatos Xhafa, “OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource- Constrained Devices,” IEEE 2015. [7] H. Xiong, X. Zhang, D. Yao, X. Wu, and Y. Wen,“Towards end-to-end secure content storage and delivery with public cloud,” in Proc. ACM Conf. Data Appl. Security Privacy, 2012, pp. 257–266. [8] K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability: Theory and implementation,” in Proc. ACM Workshop Cloud Comput. Security, 2009, pp. 43–54 [9] M. Naor and G. N. Rothblum, “The complexity of online memory checking,” J. ACM, vol. 56, no. 1, pp. 2:1–2:46, Feb. 2009. [10] Q. Zheng and S. Xu, “Fair and dynamic proofs of retrievability,”in Proc. 1st ACM Conf. Data Appl. Security Privacy, 2011, pp. 237–248. [11] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” in Proc. ACM Symp. Appl. Comput., 2011,pp. 1550–1557. [12] Q. Zheng, and S. Xu, “Secure and efficient proof of storage with deduplication,” in Proc. ACM Conf. Data Appl. Security Privacy, 2012, pp. 1–12. [13] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231–2244, Dec. 2012. [14] H. Li, B. Wang, and B. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” IEEE Trans. Cloud Comput., vol. 2, no. 1, pp. 43–56, Jan.– Mar. 2014 [15] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. 14th Eur. Symp. Res. Comput. Security, 2009, pp. 355–370