Research Article
Open access
Published on 23 October 2023
Download pdf
Cui,D. (2023). An overview of cloud storage data auditing schemes. Applied and Computational Engineering,13,68-75.
Export citation

An overview of cloud storage data auditing schemes

Dongchen Cui *,1,
  • 1 University of Electronic Science and Technology of China

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2755-2721/13/20230711

Abstract

With the rapid growth of the internet today, cloud storage services have had an impact on numerous internet users worldwide. Internet users, in order to avoid potential risk of data loss, can outsource their local data to remote cloud servers instead of using local media. However, this kind of cloud storage services is sometimes unreliable enough and the data security of users cannot be guaranteed. In this case, data auditing mechanisms for cloud storage are studied to avoid the destruction of user data. The traditional audit schemes are based on provable data possession mechanisms, while the third-party organization relies on the recent blockchain-based methods, conventional single-cloud storage system and recently emerging multi-cloud storage models. Some audit schemes not only provide auditing capability, but also have some other ancillary functions to ensure applicability for different potential malevolent situations. Gathered correlated studies about data auditing schemes of cloud service are analyzed and classified in this paper, based on research objects and research methods in order to seek probable innovation points. We also analyze experiments in their papers. Toward the finish of this review, we sum up all the examination, list the bearings not investigated, and give a few creative spots.

Keywords

data auditing, blockchain, cloud storage

[1]. Cheng, Z., Yang, X., Yupeng, H., Jiajing, W., Ju, R., Yaoxue, Z.: A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults. IEEE Transactions on Cloud Computing (Early Access), pp. 1-1. (2021).

[2]. Kai, H., Chuanhe, H., Jinhai, W., Hao, Z., Xi, C., Yilong, Lu., Lian, Z., Bin, W.: An efficient public batch auditing protocol for data security in multi-cloud storage. In: 8th ChinaGrid Annual Conference, pp. 51–56. IEEE, Los Alamitos, CA, USA (2013).

[3]. Yan, Z., Hongxin, H., Gail-Joon, A., Mengyang, Y.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231–2244. (2012).

[4]. Huaqun, W.: Identity-based distributed provable data possession in multicloud storage. IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 328–340. (2014).

[5]. Xiaodong, Y., Xizhen, P., Meiding, W., Ting, L., Caifen, W.: Multi-replica and multi-cloud data public audit scheme based on blockchain. IEEE Access, vol. 8, pp. 144809-144822. (2020).

[6]. Bin, L., Xiaoliang, Y., Shiping, C., Xiwei, X., Liming, Z.: Blockchain based data integrity service framework for IoT data. In: 24th International Conference on Web Services (ICWS), pp. 468-475. IEEE, Honolulu, HI, USA (2017).

[7]. Yang, X., Ju, R., Yan, Z., Cheng, Z., Bo, S., Yaoxue, Z.: Blockchain empowered arbitrable data auditing scheme for network storage as a service. IEEE Transactions on Services Computing, vol. 13, no. 2, pp. 289–300. (2019).

[8]. Yang, X., Cheng, Z., Guojun, W., Zheng, Q., Quanrun, Z.: A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 3, pp. 1421-1432. (2020)

[9]. Yuan, Z., Chunxiang, X., Xiaodong, L., Xuemin, S.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Transactions on Cloud Computing, vol. 9, no. 3, pp. 923-937. (2019).

[10]. Wenting, S., Jing, Q., Jia, Y., Rong, H., Jian, H., Jinxin, M.: Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, vol. 9, no. 4, pp. 1408-1421. (2019).

[11]. Boyang, W., Baochun, L., and Hui, L.: Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 43–56. (2014).

[12]. Jingting, X., Chunxiang, X., Jining, Z., Jianfeng, M.: Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Science China Information Sciences, vol. 62, no. 3, p. 32104. (2019).

[13]. Yong, Y., Liang, X., Man, A., Willy, S., Jianbing, Ni., Yafang, Z., Athanasios, V., Jian, S.: Cloud data integrity checking with an identity-based auditing mechanism from rsa. Future Generation Computer Systems, vol. 62, pp. 85–91. (2016).

[14]. Yang, X., Cheng, Z., Quanrun, Z., Guojun, W., Ju, R., Yaoxue, Z.: Blockchain-enabled accountability mechanism against information leakage in vertical industry services. IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1202-1213. (2020).

Cite this article

Cui,D. (2023). An overview of cloud storage data auditing schemes. Applied and Computational Engineering,13,68-75.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 5th International Conference on Computing and Data Science

Conference website: https://2023.confcds.org/
ISBN:978-1-83558-017-2(Print) / 978-1-83558-018-9(Online)
Conference date: 14 July 2023
Editor:Roman Bauer, Marwan Omar, Alan Wang
Series: Applied and Computational Engineering
Volume number: Vol.13
ISSN:2755-2721(Print) / 2755-273X(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).