Skip to main content

Advances, Systems and Applications

Table 3 Taxonomy of applicable Data Integrity Phases

From: Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

Type of Proposals

Category of data

Verification Types

Deterministic

Probabilistic

Static Data

Dynamic Data

PDP

PoW

PoR

Auditing

File level Verification

Entire Block Level Verification

Meta data Verification

Random Block level Verification

Public Auditing

Private Auditing

[89, 103]

[87, 104]

[85, 91, 96]

[61, 86, 88]

[105, 106]

[89, 92, 93]

[89, 104, 107]

[88, 108]

[89, 103, 109]

[88,89,90]

[87, 104, 110]

  

[97, 107]

[89, 90, 93]

 

[94, 104, 111]

[112,113,114]

 

[108, 115]

[92,93,94]

[116]

   

[94, 78, 117]

 

[114, 118, 119]

[120]

 

[121]

[78, 95, 97]

 
   

[107, 114]

 

[117]

   

[114, 122]

 
         

[123]

Â