Abstract:
Storage outsourcing is becoming more and more enchanting to both industry and academic due to the advantages of low cost, high accessibility, and easy sharing. As one of the storage farm out, cloud storage gains extensive attention in modern years. Many companies as Amazon, Google, and Microsoft, provide their own cloud storage services, where users can upload their files to the servers, access them from various devices, and share them with the others. Although cloud storage services are widely utilized in current days, there still remain many security issues and potential hazards .Data purity(9) is one of the most important properties when a user outsources its files to cloud storage(2). Users should be convinced that the files stored in the server are not manipulated. Traditional techniques for protecting data purity, such as digital signatures, require users to download all of the files from the cloud server for verification, which may cause a heavy communication cost. These techniques are not suitable for cloud storage services where users may check the purity frequently, such as every hour. Thus, researchers introduced Proof of Repository (PoR)(2) for checking the purity without downloading files from the cloud server. Furthermore, users may also require several impressive operations, such as alteration, insertion, and deletion, to update their files, while maintaining the capability of PoR(2).
Download full Length
Paper......