Cloud data auditing using proofs of retrievability
B Sengupta, S Ruj - Guide to Security Assurance for Cloud Computing, 2015 - Springer
Guide to Security Assurance for Cloud Computing, 2015•Springer
Cloud servers offer data outsourcing facility to their clients. A client outsources her data
without having any copy at her end. Therefore, she needs a guarantee that her data are not
modified by the server which may be malicious. Data auditing is performed on the
outsourced data to resolve this issue. Moreover, the client may want all her data to be stored
untampered. In this chapter, we describe proofs of retrievability (POR) that convince the
client about the integrity of all her data.
without having any copy at her end. Therefore, she needs a guarantee that her data are not
modified by the server which may be malicious. Data auditing is performed on the
outsourced data to resolve this issue. Moreover, the client may want all her data to be stored
untampered. In this chapter, we describe proofs of retrievability (POR) that convince the
client about the integrity of all her data.
Abstract
Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious. Data auditing is performed on the outsourced data to resolve this issue. Moreover, the client may want all her data to be stored untampered. In this chapter, we describe proofs of retrievability (POR) that convince the client about the integrity of all her data.
Springer
Showing the best result for this search. See all results