원문정보
초록
영어
Cloud storage offers clients great convenience to relieve them from heavy burden of storage and management, so an increasing number of clients choose to outsource their data to remote cloud providers. However, for clients, this entails a sacrifice of actual control of these files. Remote servers may suffer from disk failure for uncertain reasons or even delete rarely accessed data to sell these storages to other clients. Therefore, there’s a great necessity for clients to make sure that their data are well stored in remote servers. Numbers of remote integrity checking (RIC) schemes are proposed to solve issues above, including following up work Provable Data Possession (PDP) and Proofs of Retrievability (PoR), which can be applied in cloud auditing. This paper presents state-of-the-art RIC schemes and makes a classification from the perspective of whether they support dynamic verifications, i.e., whether they can still be used to make verifications after clients modify, insert or delete files. In static verification schemes, we delve into the mechanisms and techniques used for integrity checking. For dynamic ones, we discuss the authentication structures that support dynamic operations. We also present several remarks to guide readers to a wide vision of data checking as conclusions and future work.
목차
1. Introduction
2. Generic Verification Models
3. Classical Static Schemes
3.1. MAC-Based Schemes
3.2. RSA-Based Schemes
3.3. BLS-Based Homomorphic Methods
4. Schemes Supporting Dynamic Updates
4.1. Disguised/Special Blocks (Sentinels)
4.2. Skip List Based Schemes
4.3. Tree-Based Dynamic Schemes
4.4. Index Hash Table Based Schemes
5. Efficiency and Performance
6. Discussion and Conclusions
Acknowledgements
References