TY - JOUR
T1 - A survey of remote data integrity checking
T2 - Techniques and verification structures
AU - Chen, Yu
AU - Wang, Feng
AU - Zhu, Liehuang
AU - Zhang, Zijian
N1 - Publisher Copyright:
© 2015 SERSC.
PY - 2015/9/11
Y1 - 2015/9/11
N2 - Cloud storage offers clients great convenience to relieve them from heavy burden of storage and management, so an increasing number of clients choose to outsource their data to remote cloud providers. However, for clients, this entails a sacrifice of actual control of these files. Remote servers may suffer from disk failure for uncertain reasons or even delete rarely accessed data to sell these storages to other clients. Therefore, there’s a great necessity for clients to make sure that their data are well stored in remote servers. Numbers of remote integrity checking (RIC) schemes are proposed to solve issues above, including following up work Provable Data Possession (PDP) and Proofs of Retrievability (PoR), which can be applied in cloud auditing. This paper presents state-of-the-art RIC schemes and makes a classification from the perspective of whether they support dynamic verifications, i.e., whether they can still be used to make verifications after clients modify, insert or delete files. In static verification schemes, we delve into the mechanisms and techniques used for integrity checking. For dynamic ones, we discuss the authentication structures that support dynamic operations. We also present several remarks to guide readers to a wide vision of data checking as conclusions and future work.
AB - Cloud storage offers clients great convenience to relieve them from heavy burden of storage and management, so an increasing number of clients choose to outsource their data to remote cloud providers. However, for clients, this entails a sacrifice of actual control of these files. Remote servers may suffer from disk failure for uncertain reasons or even delete rarely accessed data to sell these storages to other clients. Therefore, there’s a great necessity for clients to make sure that their data are well stored in remote servers. Numbers of remote integrity checking (RIC) schemes are proposed to solve issues above, including following up work Provable Data Possession (PDP) and Proofs of Retrievability (PoR), which can be applied in cloud auditing. This paper presents state-of-the-art RIC schemes and makes a classification from the perspective of whether they support dynamic verifications, i.e., whether they can still be used to make verifications after clients modify, insert or delete files. In static verification schemes, we delve into the mechanisms and techniques used for integrity checking. For dynamic ones, we discuss the authentication structures that support dynamic operations. We also present several remarks to guide readers to a wide vision of data checking as conclusions and future work.
KW - Cloud storage
KW - Dynamic updates
KW - Proofs of retrievability
KW - Provable data possession
KW - Remote integrity checking
UR - http://www.scopus.com/inward/record.url?scp=85064806745&partnerID=8YFLogxK
U2 - 10.14257/ijgdc.2015.8.4.18
DO - 10.14257/ijgdc.2015.8.4.18
M3 - Article
AN - SCOPUS:85064806745
SN - 2005-4262
VL - 8
SP - 179
EP - 198
JO - International Journal of Grid and Distributed Computing
JF - International Journal of Grid and Distributed Computing
IS - 4
ER -