Topic > Cloud Auditing - 1442

This section explains the various systems proposed by other researchers with pros and cons. Y. Zhu, H. Wang, Z. Hu, et al. [11],proposed a scheme that verifies data integrity using traditional,encryption method. In this, the data is stored in the cloud and the second copy is maintained on the user side to verify the integrity of the data. But this results in wasted space and increased transmission costs between user and data storage. Therefore, it is effective but incredibly expensive to store data on both sides. Alina Oprea, Michael K. Reiter, Ke Yang [12] provided a solution to verify data integrity using block identity number and random block number which are not enough to verify data integrity. Sanket Sandesh Shahane and Raj B. Kulkarni [13] explained the characteristics of the cloud, the services provided by the cloud, the properties of data integrity, the need with the benefits of the cloud and the need with auditing applications. The document explains the three processes such as tag generation, sampling control and dynamic control which supports third-party control. HC Hsiao, YH Lin, et al. [14] designed a user-friendly hashing study that describes some faster and more accurate schemes. In this study, Chinese, Korean, and Japanese characters are compared with each other to use as hash values. He had described the strengths and weaknesses of each scheme. Wang Qian, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li [15] explained that the data storage system will try to hide errors such as data loss during transfer, power failure, etc. from customers. to improve and maintain the reputation of their customers. Own. The service provider may neglect to retain or deliberately delete data that is almost never or never accessed...... middle of the paper...... t a data storage generation approach compared to old ones and new ways to protect them like chalk and cheese. It proposes the architecture and operation of a reliable database system, yet adds little overhead to reliable storage for storing hash and log values. Untrusted programs were unable to read the database or modify it undetectably due to the database being encrypted and validated against a collision-resistant hash stored in honest storage. The model secures data and metadata uniformly via Trusted Data Base (TDB) which combines encryption and hashing. The data is placed in the storage server with the help of checkpoints created for data backup, if an attacker attacks the system the data could be restored at the checkpoint, however, if the checkpoints are lost or deleted due to some reason internal or external, the backup is performed becomes a problem rather than a solution.