Skip to main content

Advances, Systems and Applications

Table 2 Classified Phases of Data Integrity Schemes

From: Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

Ref.

Technical Methods

Data Processing Phase

Acknowledgement Phase

Auditing Phase

Initial Phase

Key & Signature Generation Phase

Encryption

Using TPA

Using Data Owner/Client

Challenge phase

Proof Verification Phase

[85]

Confidentiality Preserving Auditing

Yes

Yes

Yes

No

Yes

No

Yes

Yes

[60]

Ensuring of confidentiality and integrity data

Yes

No

Yes

No

Yes

No

No

No

[86]

Privacy preserving integrity checking model

Yes

Yes

Yes

No

Yes

No

Yes

Yes

[61]

Verifying Data Integrity

Yes

Yes

Yes

No

No

Yes

Yes

Yes

[87]

Data auditing mitigating with data privacy and data integrity

Yes

No

Yes

No

Yes

No

Yes

Yes

[88]

Public Verification of Data Integrity

Yes

Yes

Yes

No

Yes

No

Yes

Yes

[89]

Ternary Hash Tree Based Integrity Verification

Yes

Yes

Yes

No

Yes

No

Yes

Yes

[84]

Third-party auditing for cloud service providers

Yes

Yes

No

No

Yes

No

Yes

Yes

[90]

Identity-Based Integrity Auditing and Data Sharing

Yes

Yes

Yes

No

Yes

No

Yes

Yes

[91]

A Secure Data Dynamics and Public Auditing

Yes

No

Yes

No

Yes

No

Yes

Yes

[83]

Oruta: privacy-preserving public auditing

Yes

Yes

No

No

Yes

No

Yes

Yes

[92]

Dynamic Auditing Protocol

Yes

Yes

No

No

Yes

No

Yes

Yes

[93]

Dynamic Data Integrity Auditing Method

Yes

Yes

No

No

Yes

No

Yes

Yes

[94]

Algebraic Signatures-Based Data Integrity Auditing

Yes

Yes

No

Yes

Yes

No

Yes

Yes

[95]

Efficient public verification on the integrity

Yes

Yes

Yes

No

Yes

No

Yes

Yes

[96]

Attribute-Based Cloud Data Integrity Auditing

Yes

Yes

No

No

Yes

No

Yes

Yes

[78]

Efficient User Revocation in Identity-Based Cloud Storage Auditing

Yes

Yes

No

No

Yes

No

Yes

Yes

[97]

Secure and Efficient Data Integrity Verification Scheme

Yes

Yes

No

No

Yes

No

Yes

Yes