07-10-2016, 09:21 AM
1458121682-LITERATURESURVEY.docx (Size: 16.41 KB / Downloads: 4)
1. Trusted Cloud Computing with Secure Resources and Data Coloring
Trust between service providers and data owners is established by trust-overlay network over multiple data centers. Shared data objects and distributed software module are protected by Data coloring and software watermarking techniques. Also these techniques provide multi-way authentication, single sign-on and security to sensitive data. Issues for trusted cloud computing is identified by Cloud Security Alliance5. Using variable degree of shared responsibility different service-level agreements are classified.
Drawbacks:
Security issues such as data integrity and data confidentiality.
Distrust among providers, users, user groups.
2. Cooperative Schedule Data Possession for Integrity Verification in Multi-Cloud Storage
Provable data possession (PDP) is a technique to give assurance to data integrity in storage outsourcing. Cooperative PDP (CPDP) scheme depends on homomorphic verifiable response and hash index hierarchy and its security depends on multi-prover zero-knowledge proof system. Computational cost of clients and storage service providers is minimized using optimal parameter value selection method which results in lower computation and communication overheads.
Provable Data Possession and Proofs of Retrievability has been proposed to verify data availability and integrity in cloud storages. Lightweight PDP scheme depends on cryptographic hash function and symmetric key encryption was also proposed yet due to the lack of randomness in the challengesservers can cheat the owners by using previous metadata.
Drawback:
Limitation to number of updates and users cannot perform block insertions anywhere.
Combiner model is required due to multi-cloud storage which adds complexity.
3. Designated-Verifier Provable Data Possession in Public Cloud Storage
Cloud storage is an emerging technology which faces problem in security such as data confidentiality, integrity, and availability. Designated Verifier Provable Data Possession (DV-PDP) scheme design depends on ECC-based homomorphism authenticator. Costly bilinear computing is removed in this scheme. This design has PDP properties such as stateless cloud storage and verifier independent. This design is proved to be secure and efficient by security analysis and performance analysis. DV-PDP contains a trusted third party for checking data integrity with permission from its owner. Since expense pairing calculation is not done it is more efficient. This scheme does not require client expertise and provides efficient total communication overhead.
Drawback:
Verifier requires extra setup and client performs extra computation.
Complexity is increased due to pairing based approach.
4. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
Cloud Storage Provider (CSP) offer paid Storage-as-a-Service (SaaS) to organizations for data storage on remote servers which reduces cost of maintenance. Data owner gets compensation for mistakes done by CSP. This system creates trust between data owner and CSP. Its features include that only data owners can perform dynamic operations, assurance of authorized user receives outsourced data, owner is allowed to grant or revoke access to data. CSP needs to protect itself from false and illegal compensations from data owners and this system provides indirect mutual trust between them.
Drawback:
Communication cost increases when length of the content increases.
Computational cost also increases with length.