Advances, Systems and Applications
Ref. | Technical Methods | Data Processing Phase | Acknowledgement Phase | Auditing Phase | |||||
---|---|---|---|---|---|---|---|---|---|
Initial Phase | Key & Signature Generation Phase | Encryption | Using TPA | Using Data Owner/Client | Challenge phase | Proof Verification Phase | |||
[85] | Confidentiality Preserving Auditing | Yes | Yes | Yes | No | Yes | No | Yes | Yes |
[60] | Ensuring of confidentiality and integrity data | Yes | No | Yes | No | Yes | No | No | No |
[86] | Privacy preserving integrity checking model | Yes | Yes | Yes | No | Yes | No | Yes | Yes |
[61] | Verifying Data Integrity | Yes | Yes | Yes | No | No | Yes | Yes | Yes |
[87] | Data auditing mitigating with data privacy and data integrity | Yes | No | Yes | No | Yes | No | Yes | Yes |
[88] | Public Verification of Data Integrity | Yes | Yes | Yes | No | Yes | No | Yes | Yes |
[89] | Ternary Hash Tree Based Integrity Verification | Yes | Yes | Yes | No | Yes | No | Yes | Yes |
[84] | Third-party auditing for cloud service providers | Yes | Yes | No | No | Yes | No | Yes | Yes |
[90] | Identity-Based Integrity Auditing and Data Sharing | Yes | Yes | Yes | No | Yes | No | Yes | Yes |
[91] | A Secure Data Dynamics and Public Auditing | Yes | No | Yes | No | Yes | No | Yes | Yes |
[83] | Oruta: privacy-preserving public auditing | Yes | Yes | No | No | Yes | No | Yes | Yes |
[92] | Dynamic Auditing Protocol | Yes | Yes | No | No | Yes | No | Yes | Yes |
[93] | Dynamic Data Integrity Auditing Method | Yes | Yes | No | No | Yes | No | Yes | Yes |
[94] | Algebraic Signatures-Based Data Integrity Auditing | Yes | Yes | No | Yes | Yes | No | Yes | Yes |
[95] | Efficient public verification on the integrity | Yes | Yes | Yes | No | Yes | No | Yes | Yes |
[96] | Attribute-Based Cloud Data Integrity Auditing | Yes | Yes | No | No | Yes | No | Yes | Yes |
[78] | Efficient User Revocation in Identity-Based Cloud Storage Auditing | Yes | Yes | No | No | Yes | No | Yes | Yes |
[97] | Secure and Efficient Data Integrity Verification Scheme | Yes | Yes | No | No | Yes | No | Yes | Yes |