EMERGING METHODS OF DATA INTEGRITY AUDITING IN THE CLOUD: A SYSTEMATIC REVIEW OF RECENT TRENDS

Authors

  • Jairo Aldair Ríos Reyes Universidad Nacional de Trujillo
  • Renzo Yanpier Vásquez Chiclayo Universidad Nacional de Trujillo
  • Alberto Carlos Mendoza de los Santos Universidad Nacional de Trujillo

DOI:

https://doi.org/10.23881/idupbo.023.1-8i

Keywords:

Auditoría de Integridad de Datos, Computación en la Nube, Técnicas Criptográficas, Técnicas de Auditoría

Abstract

Data integrity auditing methods in the cloud are essential to ensure the protection and confidentiality of stored data. In this regard, various auditing techniques have been developed that focus on detecting and preventing malicious or unauthorized data manipulations. The systematic review examined different approaches to data integrity auditing, including policy-based auditing, dynamic auditing, multi-copy auditing, and identity-based auditing, among others. It was identified that some of the most successful and promising methods are those that use advanced cryptographic techniques, such as policy-based attribute encryption and identity encryption. Additionally, it was found that most of the proposed methods use Merkle tree structures and hash tables to improve the efficiency and scalability of auditing processes. Overall, this systematic review provides an overview of emerging data integrity auditing methods in the cloud, which may be useful for information security researchers and professionals seeking to implement efficient and effective solutions for data protection.

Downloads

Download data is not yet available.

Author Biographies

Jairo Aldair Ríos Reyes, Universidad Nacional de Trujillo

Facultad de Ingeniería

Renzo Yanpier Vásquez Chiclayo, Universidad Nacional de Trujillo

Facultad de Ingeniería

Alberto Carlos Mendoza de los Santos, Universidad Nacional de Trujillo

Facultad de Ingeniería

References

W. Shen, J. Qin, J. Yu, R. Hao, J. Hu, J. Ma. “Data integrity method for dynamic auditing in cloud environment.” IEEE Transactions on Cloud Computing, vol. 9, pp. 1408-1421. 2021.

B. Shao, L. Zhang, G. Bian. “Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud.” Electronics (Switzerland), vol. 12, Marzo. 2023.

T. Sang, P. Zeng, K. Choo. “Provable Multiple-Copy Integrity Auditing Scheme for Cloud-Based IoT.” IEEE Systems Journal, vol. 17, pp. 224-233, Marzo. 2023.

W. Shen, J. Qin, J. Yu, R. Hao, J. Hu. “Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage.” IEEE Transactions on Information Forensics and Security, vol. 14, pp. 331-346, Febrero. 2019.

Z. Tu, X. An Wang, W. Du, Z. Wang, M. Lv. “An improved multi-copy cloud data auditing scheme and its application.” Journal of King Saud University - Computer and Information Sciences, vol. 35q, pp. 120-130, Marzo. 2023.

H. Wang, J. Liang, Y. Ding, S. Tang, Y. Wang. “Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health.” Computer Standards and Interfaces, vol. 84, Marzo. 2023.

Z. Liu, S. Wang, S. Duan, L. Ren, J. Wei. “Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage.” Electronics (Switzerland), vol. 12, Febrero. 2023.

L. Krithikashree, S. Manisha, M. Sujithra. “Audit Cloud: Ensuring Data Integrity for Mobile Devices in Cloud Storage.” in Proc. ICCCNT, 2018, pp. 1-5.

H. Tian, F. Nan, C. Chang, Y. Huang, J. Lu, Y. Du. “Privacy-preserving public auditing for secure data storage in fog-to-cloud computing.” Journal of Network and Computer Applications, vol. 127, pp. 59-69, Febrero. 2019.

F. Chen, F. Meng, T. Xiang, H. Dai, J. Li, J. Qin. “Towards Usable Cloud Storage Auditing.” IEEE Transactions on Parallel and Distributed Systems, vol. 31, pp. 2605-2617, Noviembre. 2020.

M. Page, et al. “The PRISMA 2020 statement: an updated guideline for reporting systematic reviews”. 2021. doi: 10.1136/bmj.n71

C. Manterola. “Revisiones sistemáticas de la literatura. Qué se debe saber acerca de ellas”. 2013. doi: 10.1016/j.ciresp.2011.07.009

A. Fu, S. Yu, Y. Zhang, H. Wang, C. Huang. “NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users.” IEEE Transactions on Big Data, vol. 8, pp. 14-24, Febrero. 2022.

Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni. “Fuzzy identity-based data integrity auditing for reliable cloud storage systems.” IEEE Transactions on Dependable and Secure Computing, vol. 16, pp. 72-83, Enero-Febrero. 2019.

M. Sookhak, R. Yu, A. Zomaya. “Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables.” IEEE Transactions on Parallel and Distributed Systems, vol. 29, pp. 999-1012, Marzo. 2018.

X. Tang, Y. Huang, C. -C. Chang, L. Zhou. “Efficient Real-Time Integrity Auditing with Privacy-Preserving Arbitration for Images in Cloud Storage System” in IEEE Access, vol. 7, pp. 33009-33023, Marzo. 2019.

J. Zhang, B. Wang, X. Wang, H. Wang, S. Xiao. “New group user based privacy preserving cloud auditing protocol” Future Generation Computer Systems, vol. 106, pp. 585-594, Mayo. 2020.

S. Anbuchelian, C. Sowmya, C. Ramesh. “Efficient and secure auditing scheme for privacy preserving data storage in cloud” Cluster Comput, vol. 22, pp. 9767-9775, Julio. 2019.

X. Yang, M. Wang, T. Li, R. Lui, C. Wang. “Privacy-Preserving Cloud Auditing for Multiple Users Scheme with Authorization and Traceability” in IEEE Access, vol. 8, pp. 130866-130877, Julio. 2020.

X. Li, S. Liu, R. Lu, M. Khurram, K. Gu, X. Zhang. “An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System” IEEE J Biomed Health Inform., Mayo. 2022.

Y. Zhang, H. Zhang, R. Hao, J. Yu. “Authorized identity-based public cloud storage auditing scheme with hierarchical structure for large-scale user groups” in China Communications, vol. 15, pp. 111-121, Noviembre. 2018.

A. Juels, B. Kaliski. “Pors: proofs of retrievability for large files” in Proceedings of the 14th ACM conference on Computer and communications security (CCS '07), pp 584–597, Octubre 2007.

M. Azraoui, K. Elkhiyaoui, R. Molva, M. Önen. “StealthGuard: Proofs of Retrievability with Hidden Watchdogs.” in Computer Security - ESORICS 2014, vol 8712, pp 239–256, 2014.

H. Tian, Y. Chen, H. Jiang, Y. Huang, F. Nan, Y. Chen, “Public Auditing for Trusted Cloud Storage Services”, in IEEE Security & Privacy, vol. 17, no. 1, pp. 10-22, Jan.-Feb. 2019.

L. Zhou, A. Fu, S. Yu, M. Su, B. Kuang, “Data integrity verification of the outsourced big data in the cloud environment: A survey”, Journal of Network and Computer Applications, vol 122, pp 1-15, Noviembre. 2018.

H. Wang, D. He, J. Yu, Z. Wang, "Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession", in IEEE Transactions on Services Computing, vol. 12, no. 5, pp. 824-835, Octubre. 2019.

J. Li, H. Yan, Y. Zhang, "Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage" in IEEE Systems Journal, vol. 15, no. 1, pp. 577-585, Marzo 2021.

N. Garg, S. Bawa, N. Kumar. “An efficient data integrity auditing protocol for cloud computing” in Future Generation Computer Systems, vol. 109, pp. 306-316. 2020.

W. Shen, J. Qin, J. Yu, R. Hao, J. Hu y J. Ma, "Data Integrity Auditing without Private Key Storage for Secure Cloud Storage", en IEEE Transactions on Cloud Computing, vol. 9, no. 4, pp. 1408-1421, 1 Oct.-Dec. 2021, doi: 10.1109/TCC.2019.2921553.

Published

2023-07-31

How to Cite

Ríos Reyes, J. A., Vásquez Chiclayo, R. Y., & Mendoza de los Santos, A. C. (2023). EMERGING METHODS OF DATA INTEGRITY AUDITING IN THE CLOUD: A SYSTEMATIC REVIEW OF RECENT TRENDS. Revista Investigación &Amp; Desarrollo, 23(1). https://doi.org/10.23881/idupbo.023.1-8i

Issue

Section

Ingenierías