Visible to the public A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation

TitleA Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
Publication TypeConference Paper
Year of Publication2019
AuthorsBabu, T. Kishore, Guruprakash, C. D.
Conference Name2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
Keywordscloud computing, Cloud Security, cloud storage, communication cost, computation overhead, computational overhead, considerable efficiency, data integrity, data integrity checking method, Data security, Human Behavior, Merkel hash tree, Merkel hash tree method, performance evaluation, privacy, program verification, pubcrawl, public auditing, Resiliency, Scalability, security analysis, Security Audits, security of data, storage management, systematic review, Third Party Auditing, third party auditing method, TPA methods
AbstractCloud storage offers a considerable efficiency and security to the user's data and provide high flexibility to the user. The hackers make attempt of several attacks to steal the data that increase the concern of data security in cloud. The Third Party Auditing (TPA) method is introduced to check the data integrity. There are several TPA methods developed to improve the privacy and efficiency of the data integrity checking method. Various methods involved in TPA, have been analyzed in this review in terms of function, security and overall performance. Merkel Hash Tree (MHT) method provides efficiency and security in checking the integrity of data. The computational overhead of the proof verify is also analyzed in this review. The communication cost of the most TPA methods observed as low and there is a need of improvement in security of the public auditing.
DOI10.1109/ICCMC.2019.8819848
Citation Keybabu_systematic_2019