“…Kundu et al [41] also introduced an approach that can be performed by the TPA to audit the shared data integrity. Data can be audited with no need to store all of the data in the cloud.…”
Section: Privacy-preserving Public Auditing For Shared Cloud Datamentioning
confidence: 99%
“…• Pioneer in privacy-preserving schemes for cloud • Supports privacy-preserving public auditing PPPASCD [41] • The proxy re-signature scheme is used for outsourcing the updated operations • TPA consumes more time • Highly efficient for dynamic groups • The private key is shared between the group's shared data for computing signatures. and bandwidth to achieve…”
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC’s data in the cloud, several security paradigms of cloud computing based on a third-party auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC’s data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC’s data by playing a malicious role. In this paper, we present the state of the art of cloud computing’s privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance are discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA’s privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement.
“…Kundu et al [41] also introduced an approach that can be performed by the TPA to audit the shared data integrity. Data can be audited with no need to store all of the data in the cloud.…”
Section: Privacy-preserving Public Auditing For Shared Cloud Datamentioning
confidence: 99%
“…• Pioneer in privacy-preserving schemes for cloud • Supports privacy-preserving public auditing PPPASCD [41] • The proxy re-signature scheme is used for outsourcing the updated operations • TPA consumes more time • Highly efficient for dynamic groups • The private key is shared between the group's shared data for computing signatures. and bandwidth to achieve…”
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC’s data in the cloud, several security paradigms of cloud computing based on a third-party auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC’s data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC’s data by playing a malicious role. In this paper, we present the state of the art of cloud computing’s privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance are discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA’s privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement.
“…5.1.5. Privacy-preserving public auditing for shared cloud data Kundu et al [72] also introduced an approach that can be performed by the TPA to audit the shared data integrity. Data can be audited with no need to store the whole data in the cloud.…”
Section: Secure and Efficient Privacy-preserving Public Auditing (Sepppa) Protocolmentioning
confidence: 99%
“…The proposed method's iterating frequency is finite; however, it presents an efficient solution and carries out a dynamic data operation [103]. • Pioneer in privacy-preserving schemes for cloud • Supports privacy-preserving public auditing PPPASCD [72] • The proxy re-signature scheme is used for outsourcing the updated operations • TPA consumes more time • Highly efficient for dynamic groups • The private key is shared between the group's shared data for computing signatures.…”
Section: Privacy Negotiation Language (Pnl) Based On Description Logicmentioning
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between Cloud Clients (CC) and Cloud Service Providers (CSP), as well as safeguarding the CC’s data in the cloud, several security paradigms of cloud computing based on a Third-Party Auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC’s data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC’s data by playing a malicious role. In this paper, we present the state-of-art of cloud computing’s privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance have been discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA’s privacy preserving models have been comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.