Public auditing for big data storage in cloud computing - A survey
- Publication Type:
- Conference Proceeding
- Citation:
- Proceedings - 16th IEEE International Conference on Computational Science and Engineering, CSE 2013, 2013, pp. 1128 - 1135
- Issue Date:
- 2013-12-01
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
![]() | 2013004428OK.pdf | 413.55 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
Data integrity is an important factor to ensure in almost any data and computation related context. It serves not only as one of the qualities of service, but also an important part of data security and privacy. With the proliferation of cloud computing and the increasing needs in big data analytics, verification of data integrity becomes increasingly important, especially on outsourced data. Therefore, research topics related to data integrity verification have attracted tremendous research interest. Among all the metrics, efficiency and security are two of the most concerned measurements. In this paper, we provide an analysis on authenticator-based efficient data integrity verification. we will analyze and provide a survey on the main aspects of this research problem, summarize the research motivations, methodologies as well as main achievements of several of the representative approaches, then try to bring forth a blueprint for possible future developments. © 2013 IEEE.
Please use this identifier to cite or link to this item: