International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1107
A Survey on Batch Auditing Systems for Cloud Storage
Darshan Kumar G
1
, Dr. K .Thippeswamy
2
1
Student, Department CS&E, VTU Centre for PG Studies, Mysuru, Karnataka.
2
Professor & Head of Department CS&E, VTU Centre for PG Studies, Mysuru, Karnataka.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – As the Emergent technology in the IT world,
Cloud Computing has spread over different facets of IT
industry in software, platform & Infrastructure as service
streams. The skill allows us to store the data in the place
where we are allow access it anywhere and anytime we need.
Its popularity is in its peak because of its potential and services
given to use for cheap cost by Cloud Service Providers. as the
technology is more complex and its internal organization is
clumsy still toddy, many challenges it has faced and still facing
in the terms of availability and many more but most
challenges are faced regarding the security of e data stored by
the user in cloud. There are many methodologies are
introduced for overcoming the security issues .Auditing
systems are the system which is intended to work on the
security issues which utilizes complex and secure algorithms
.Public Auditing & Private Auditing are the auditing systems
used. This paper shows the Batch Auditing systems from the
beginning and present ongoing researches on it.
Key Words: Cloud Computing, Security Issues, Batch
Auditing, Cloud Service Providers, Public Auditing, Private
Auditing.
1. INTRODUCTION
With the entry of cloud computing, which give foundation,
stage, programming and different administrations for cloud
clients, individuals can without much of a stretch access to
less expensive and all the more capable processors and
capacity. Client can facilitate the weight of putting away
colossal information in neighborhood frameworks, with the
cloud computing worldview client can ready to store the
information into cloud and can recover at whatever point
client needs. The cloud demonstrate has inspired industry
and the scholarly community to receive distributed
computing to have a wide range of uses running from high
computationally concentrated applications down to light
weight administrations. As per a Gartner study on
distributed computing incomes, the cloud market was worth
USD 58.6B in 2009 , is required to be USD 68B in 2010 and
will reach USD 148B by 2014. These incomes infer that cloud
computing is a promising stage. Then again, it builds the
assailants' enthusiasm for finding existing vulnerabilities in
the model. Regardless of the potential advantages and
incomes that could be picked up from the distributed
computing model, the model still has a considerable measure
of open issues that effect the model respectability and
inescapability. Merchant secure, multi-tenure and
disconnection, information administration, benefit
compactness, flexibility motors, SLA administration, and
cloud security .
The Cloud computing paradigm is built on several important
modules among them the most important are :
Cloud User
Cloud Service Provider and
Third party Auditor
The First two components are the basic and more important,
Cloud User is one who Uses the services provided by the
Cloud service providers. And the basic, managing services,
maintaining &storing data are done by cloud service
provider who provides services for user. The third party
auditor comes when the cloud is seen in the security
perspective of both user and Provider. He is the entity who is
independent and has connected to both User and the cloud
service provider, and has the most experience and capability
on the verification which is the aim of auditing and solution
to the security issues.
2. RELATED WORKS
There are many papers, Methods, Techniques are proposed
in the view of Auditing for security purpose of cloud storage.
Before that let us know the Existing auditing systems in use:
Public Auditing
Private Auditing
These two types of auditing are most popular.
Private auditing allows user to challenge the provider to
check the integrity of his data .In single task high efficiency is
achievable in this case but it is burden to user although
efficiency is high.
Public auditing scheme allows data owner i.e. user to
delegate a component who is expertise in it and most
promisable and trustworthy next to Provider. And with the
help of Component he/she can check their integrity .the
component is TPA known as Third Party Auditor.
According to Ateniese’s the Provable data Possession model ,
defines the public auditing using the technique which uses
RSA based homomorphic tag. This is the first model to define
the public auditing. The Tag length is 1024 bits long and also
it solves the private validation problem.
According to juels and kaliski the method which uses the BLS
signature and pseudorandom function which they proposed
popularly known as DzProof of Retrivabilitydz in which the