2. Cloud data services stores data in the cloud as well
as shares data among many users.
Preserving the data in cloud is very difficult.
To overcome this problem privacy –preserving
mechanism is designed which supports public
auditing on shared data stored in the cloud.
3. Cloud computing is a class of network based
computing through internet.
It is a computing in which large groups of remote
servers are networked to allow centralized data
storage and online access to computer services.
Clouds can be classified as public, private, or hybrid.
Cloud Computing provides various service models
i.e. PaaS,SaaS,IaaS,DaaS,STaaS,SECaaS ,etc.
4. AUTHOR
NAME
TITLE ADVANTAGES DISADVANTAGES
B. Wang, B. Li
and H. Li
“Knox” : Privacy-
Preserving
Auditing For
Shared Data with
Large groups in
the cloud.
Is able to audit
the integrity
shared data in the
cloud for large
groups
It cannot support
public auditing
G.Ateniese,
R.D.Pietro
Scalable and
Efficient
Provable Data
possession
It supports
partially
dynamic data
operations
It cannot support
public verifiability
5. AUTHOR
NAME
TITLE ADVANTAGES DISADVANTAG
ES
G. Ateniese,
R. Burns,
R. Curtmola,
J. Herring,
L. Kissner
Provable Data
Possession
At Untrusted
Stores
It provides public
verifiability
But it supports
only static data
A.Juels,
B.S Kaliski
Privacy-
Preserving Public
Auditing & Data
Integrity for
Secure Cloud
Storage
Reduces
communication
and computation
It does not
immediately offer
any guarantee on
data integrity and
availability.
6. Sharing data among multiple users is one of the most
attractive features that motivates the cloud storage.
Unique problem aroused during the process of
public auditing for the shared data in the cloud
is how to preserve identity privacy from the TPA.
Public auditability allows an external party other
than the user to verify the correctness of remotely
stored data
8. Our scheme supports an external auditor to audit
user’s outsourced data in the cloud.
Achieves batch auditing where multiple delegated
auditing tasks from different users can be performed
simultaneously by the TPA.
Public verifier can verify the integrity of the shared
data without retrieving the entire data.
16. Public auditing allows TPA along with the User to check the
integrity of the data stored on a cloud .
TPA can audit the data and hence cloud data privacy is
maintained. This includes four steps
• Keygen
• Singen
• GenProof
• VerifyProof
17. It is divided in to two parts with Setup phase and
Audit phase :
Setup Phase
Audit Phase
18. TPA may concurrently handle multiple
auditing delegations upon different user’s
requests.
The individual auditing of these tasks for TPA
can be tedious and very inefficient.
Batch auditing also greatly reduces the
computation cost on the TPA side.
19. It also supports operations such as INSERT,
DELETE & MODIFY
It supports data dynamics where user can
frequently update the data stored on the cloud
20. In our Project we proposed ORUTA, the first
Privacy Preserving Public Auditing Mechanism for
shared data in the cloud.
To improve the Efficiency of verification for multiple
auditing tasks we further extend our mechanism to
support batch auditing.
21. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage
Security in Cloud Computing,” in Proc. IEEE/ACM International
Workshop on Quality of Service (IWQoS), 2009, pp. 1–9.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.
Peterson, and D. Song, “Provable Data Possession at Untrusted
Stores,” in Proc. ACM Conference on Computer and
Communications Security (CCS), 2007, pp. 598–610.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public
Auditing for Data Storage Security in Cloud Computing,” in Proc.
IEEE International Conference on Computer Communications
(INFOCOM), 2010, pp. 525–533.