Data error locations reported by public auditing in cloud storage service

2014 ◽  
Vol 21 (3) ◽  
pp. 373-390 ◽  
Author(s):  
Min-Shiang Hwang ◽  
Cheng-Chi Lee ◽  
Tsuei-Hung Sun
2017 ◽  
Vol 26 (05) ◽  
pp. 1750072 ◽  
Author(s):  
Min-Shiang Hwang ◽  
Tsuei-Hung Sun ◽  
Cheng-Chi Lee

Recently, storage as a service of cloud computing becomes a new trend to access or share files. Once files are stored in cloud, owner can access files seamlessly by personal computer or mobile device. However, owner may worry about confidentiality and integrity of owner's files stored in cloud because cloud service providers are not always trustworthy. Therefore, there are many kinds of data correctness verification methods proposed to prevent cloud service providers from cheating data owners. Among these models for auditing, bilinear pairing can achieve the most efficient way to verify data correctness and batch auditing. Although auditing methods can ensure whether data is stored properly, it is not considered that the data may be a secret data or a data owner does not want to be known by both auditors and cloud service providers. Another important issue is providing dynamic data of auditing in cloud. Wang et al.13 proposed a scheme that can provide public auditing and dynamic data, but it still cannot guarantee whether cloud has updated data honestly. For this reason, we propose a dynamic data guarantee and data confidentiality scheme for public auditing in cloud storage service.


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


2016 ◽  
Vol 24 (2) ◽  
pp. 57-74 ◽  
Author(s):  
Chen-Shu Wang ◽  
Cheng-Yu Lai ◽  
Shiang-Lin Lin

In recent year, mobile devices have become an indispensable product in our daily life. Extensive amount of mobile applications (Apps) have been developed and used on these devices. Restated, in terms of the Apps future development and popularization, to understand why people have willingness to pay for use certain Apps has apparently became an important issue. However, there are various homogeneity Apps, which people can easily find some free succedaneum for use. Consequently, it would be an interesting issue to realize individual's intention to pay for use the Apps. In this study, the authors conducted a survey in Taiwan to realize individuals' willingness to pay for Cloud Storage Service (CSS), since CSS is one of the frequently adopted App for most mobile device users. The results show that both the perceived service quality and conformity positively affect the perceived value and then increases the user's willingness to pay indirectly. In addition, the findings also support that the users' product knowledge about CSS produce negative moderating effects on the perceived value and the willingness of pay.


2017 ◽  
pp. 197-219 ◽  
Author(s):  
Surya Nepal ◽  
Shiping Chen ◽  
Jinhui Yao

2019 ◽  
Vol 15 (4) ◽  
pp. 155014771984127 ◽  
Author(s):  
Gang Yu ◽  
Yongjuan Wang ◽  
Zhenfu Cao ◽  
Jian Lin ◽  
Xiangyu Wang

Sign in / Sign up

Export Citation Format

Share Document