Visible to the public Biblio

Filters: Keyword is protocol auditing  [Clear All Filters]
2017-02-23
J. Shen, S. Ji, J. Shen, Z. Fu, J. Wang.  2015.  "Auditing Protocols for Cloud Storage: A Survey". 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA). :222-227.

So far, cloud storage has been accepted by an increasing number of people, which is not a fresh notion any more. It brings cloud users a lot of conveniences, such as the relief of local storage and location independent access. Nevertheless, the correctness and completeness as well as the privacy of outsourced data are what worry could users. As a result, most people are unwilling to store data in the cloud, in case that the sensitive information concerning something important is disclosed. Only when people feel worry-free, can they accept cloud storage more easily. Certainly, many experts have taken this problem into consideration, and tried to solve it. In this paper, we survey the solutions to the problems concerning auditing in cloud computing and give a comparison of them. The methods and performances as well as the pros and cons are discussed for the state-of-the-art auditing protocols.