Skip to main content

Advances, Systems and Applications

Table 5 Comparison of Communication Overhead between DO, CSP and TPA During Auditing Phase

From: Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

Ref.

Data Owner

Cloud Service Provider

Third Party Auditor

[88]

Not Considerable

\(log2_c +160\)

\((s + 1) p\)

[89]

Not Considerable

\(2j|k|+|r|\)

\(2|hash|+2j|k|+360\)

[90]

Not Considerable

\(|p|+|q|\)

\(c.(|n|+|p|)\)

[133]

Not Considerable

\(log2_c + (c + 1) log2_p\)

\((s + 1) log2_p\)

[78]

Not Considerable

\(n|p|+n|q|\)

\((c + 1). |q|+ |p| + c |id|\)

[87]

Not Considerable

j|k|

j|Hash|

[105]

Not Considerable

j|k|

Not Applicable (Private Auditing)

[134]

Not Considerable

\(c|s|+|p|\)

\(|p|+2|q|\)

[97]

Not Considerable

\(K(|p|+|q|)\)

\(2p.(k+q)\)

[135]

Not Considerable

\(c(|p| + |n|)\)

\((s + 1)|p|\)

[94]

Not Considerable

\(|hash|+j|id|+ j|k|\)

\(|k|(j+1)+|c|\)