ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review on Auditing in Cloud

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 5)

Publication Date:

Authors : ;

Page : 1312-1317

Keywords : Cloud auditing; Public Auditing; cloud data security; provable data possession; authorized auditing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud Computing is the usage of puddle of assets for distant users through internet that is easily available and expanded. The users accessing storage services of cloud has no direct control over their data, hence data security has become one of the major concerns in cloud. Current research work has already allowed the verification of data integrity without changing of the actual data file. This process was done by a trusted third party data auditing by an auditor. However, this scheme has from many common drawbacks. First, there is no proper authorization/authentication process between the auditor and cloud service provider and it may open the data contents to the auditor because it requires the server to send the local data blocks to the auditor. Consistency of the audits can be ensured by doing multiple auditing tasks simultaneously. To have real benefit, an audit program must be designed in such a way that it can be sustainable, both in terms of management commitment and to the ongoing development of talented and capable auditors. A management process addresses the content and scope of the audits, standards and regulations that apply to the facilities, use of audit protocols, the frequency of audits, and training of auditors is integral to an effective and sustainable auditing program. To securely introduce a reliable TPA the following two fundamental conditions have to be fulfilled 1) TPA must be able to audit the cloud data storage without asking the actual copy of data, and hence induce no extra load to the cloud user, 2) Also the third party auditing process should bring in no new problems towards user data privacy. In this paper, I explain importance of audit and its features. Different types of audit practices provide the opportunity to emphasize different aspects of the management program.

Last modified: 2021-07-01 14:37:34