2021
DOI: 10.3390/electronics10212721
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey

Abstract: Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from full… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 61 publications
0
6
0
Order By: Relevance
“…This solution ensures data integrity by storing data information through a decentralized network of nodes, thus preventing data from being tampered with or corrupted. Trusted third-party auditing is often introduced for information transfer in cloud servers (TPA) [13] is involved to verify data integrity, with a diagram of the traditional cloud data integrity verification model shown in Figure 4. Yue [15] et al proposed a data integrity verification framework based on blockchain technology.…”
Section: Blockchain and Merkle Hash Tree Based Technologymentioning
confidence: 99%
“…This solution ensures data integrity by storing data information through a decentralized network of nodes, thus preventing data from being tampered with or corrupted. Trusted third-party auditing is often introduced for information transfer in cloud servers (TPA) [13] is involved to verify data integrity, with a diagram of the traditional cloud data integrity verification model shown in Figure 4. Yue [15] et al proposed a data integrity verification framework based on blockchain technology.…”
Section: Blockchain and Merkle Hash Tree Based Technologymentioning
confidence: 99%
“…Analyzing the sources of the above table, we can say that in [69,78,80,83,85,86] the authors built schematic models to demonstrate their usefulness, and in [71,[73][74][75][76][77]81,82,84,[87][88][89][90] the authors cited models either existing, described in words or only mathematically. This approach may not be clear to everyone, and may also cause difficulties.…”
Section: Name Of the Property Publication A Brief Descriptionmentioning
confidence: 99%
“…It is made to embed resource computing and communication among all the physical devices [1]. Cloud computing requires a wide range of services that includes platform as a service (PaaS), desktop as a service (DaaS), software as a service (SaaS), and infrastructure as a service (IaaS) [2]. There is a traditional storage technology that is directly attached to the redundant arrays, and to the produced independent disks for generating the storage network area.…”
Section: Introductionmentioning
confidence: 99%