{"title":"云环境下远程数据完整性校验技术研究","authors":"Sasikala Chinthakunta, Shoba Bindu Chigarepalli","doi":"10.1109/PKIA.2017.8278959","DOIUrl":null,"url":null,"abstract":"Remote Data Integrity Checking (RDIC) is crucial for implementing secure cloud storage. It enables the users to check the integrity of the outsourced data without downloading the entire data. As a solution to this, some RDIC protocols have been proposed by many researchers. Most of the existing RDIC protocols are designed based on Public Key Infrastructure (PKI) and ID-Based Cryptography (IBC). However, each protocol has its own advantages and disadvantages. This paper presents a detailed study on RDIC protocols in a cloud environment and discusses the taxonomy of RDIC protocols such as Provable Data Possession (PDP), Proof of Retrievability (POR), Proof of Ownership (POW) and ID-based RDIC protocols. We also analysze and compares the existing RDIC approaches based on the parameters such as integrity checking method, cryptographic model, auditing mode and data recovery. Finally, it throws light on the open issues such as research directions in designing RDIC protocol.","PeriodicalId":393622,"journal":{"name":"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A study on remote data integrity checking techniques in cloud\",\"authors\":\"Sasikala Chinthakunta, Shoba Bindu Chigarepalli\",\"doi\":\"10.1109/PKIA.2017.8278959\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Remote Data Integrity Checking (RDIC) is crucial for implementing secure cloud storage. It enables the users to check the integrity of the outsourced data without downloading the entire data. As a solution to this, some RDIC protocols have been proposed by many researchers. Most of the existing RDIC protocols are designed based on Public Key Infrastructure (PKI) and ID-Based Cryptography (IBC). However, each protocol has its own advantages and disadvantages. This paper presents a detailed study on RDIC protocols in a cloud environment and discusses the taxonomy of RDIC protocols such as Provable Data Possession (PDP), Proof of Retrievability (POR), Proof of Ownership (POW) and ID-based RDIC protocols. We also analysze and compares the existing RDIC approaches based on the parameters such as integrity checking method, cryptographic model, auditing mode and data recovery. Finally, it throws light on the open issues such as research directions in designing RDIC protocol.\",\"PeriodicalId\":393622,\"journal\":{\"name\":\"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)\",\"volume\":\"256 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PKIA.2017.8278959\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PKIA.2017.8278959","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A study on remote data integrity checking techniques in cloud
Remote Data Integrity Checking (RDIC) is crucial for implementing secure cloud storage. It enables the users to check the integrity of the outsourced data without downloading the entire data. As a solution to this, some RDIC protocols have been proposed by many researchers. Most of the existing RDIC protocols are designed based on Public Key Infrastructure (PKI) and ID-Based Cryptography (IBC). However, each protocol has its own advantages and disadvantages. This paper presents a detailed study on RDIC protocols in a cloud environment and discusses the taxonomy of RDIC protocols such as Provable Data Possession (PDP), Proof of Retrievability (POR), Proof of Ownership (POW) and ID-based RDIC protocols. We also analysze and compares the existing RDIC approaches based on the parameters such as integrity checking method, cryptographic model, auditing mode and data recovery. Finally, it throws light on the open issues such as research directions in designing RDIC protocol.