Competitive Analysis for the Auditing Cloud Consistency
DOI:
https://doi.org/10.32628/IJSRST229396Keywords:
Cloud storage services, cloud service provider, con- sistency, consistency as a service, heuristic auditing strategy.Abstract
Cloud storage is one of the service of cloud comput- ing. Cloud storage services are commercially popular because to their advantages. It allows data owners to move data from their local computing systems to the cloud. It offers high quality and on-demand data storage services to users. A cloud is essentially a large-scale distributed system; each piece of data is replicated on multiple geographically distributed servers to achieve high availability and high performance. A cloud service provider (CSP) keeps multiple replicas for user’s data on geographically distributed servers. A main problem of using the replication technique in clouds is that it is very expensive to achieve strong consistency on a worldwide scale. In this paper, we are reviewing consistency as a service (CaaS) model, a two-level auditing architecture and a heuristic auditing strategy (HAS) that reveals as many violations as possible.
References
- Qin Liu, Guojun Wang, Member, IEEE, and Jie Wu, “Consistency as a Service: Auditing Cloud Consistency,” in IEEE transactions on network and service management, vol. 11, no. 1, march 2014
- T. Kraska, M. Hentschel, G. Alonso, and D. Kossmann, “Consistency rationing in the cloud: pay only when it matters,” in Proc. 2009 VLDB.
- H. Wada, A. Fekete, L. Zhao, K. Lee, and A. Liu, “Data consistency properties and the trade-offs in commercial cloud storages: the con- sumers’perspective,” in Proc. 2011 CIDR.
- P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” as a technical report, Nat’l Inst. of Standards and Technology, 2009.
- Yang, K., Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24(9), 17171726.
- M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski,
- G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, 2010.
- Andrew S. Tanenbaum , Maarten Van Steen, Distributed Systems: Principles and paradigms.
- G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels, “Dynamo: Amazons highly available key-value store,” in Proc. 2007 ACM SOSP.
- Werner vogels, “Eventually consistent,” Commun. ACM, vol. 52, no. 1, 2009.
- E. Anderson, X. Li, M. Shah, J. Tucek, and J. Wylie, “What consistency does your key-value store actually provide,” in Proc. 2010 USENIX HotDep.
- W. Golab, X. Li, and M. Shah, “Analyzing consistency properties for fun and profit,” in Proc. 2011 ACM PODC.
- W. Vogels, “Data access patterns in the Amazon.com technology platform,”in Proc. 2007 VLDB.
- E. Brewer, “Towards robust distributed systems,” in Proc. 2000 ACM PODC.
- M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska, “Building a database on S3,” in Proc. 2008 ACM SIGMOD.
- S. Esteves, J. Silva, and L. Veiga, “Quality-of-service for consistency of data geo-replication in cloud computing,” Euro-Par 2012 Parallel Processing, vol. 7484, 2012.
- D. Bermbach and S. Tai, “Eventual consistency: how soon is eventual?” in Proc. 2011 MW4SOC.
- D. Kossmann, T. Kraska, and S. Loesing, An evaluation of alternative architectures for transaction processing in the cloud, in Proc. 2010 ACM SIGMOD.
- D. B. Terry et al. Session guarantees for weakly consistent replicated data. In Proc of International Conference on Parallel and Distributed Information Systems (PDIS’94)., pages 140149. IEEE Computer Society, 1994.
- Rashmi, R. Patil, Yatin Gandhi, Vinaya Sarmalkar, Prajakta Pund, and Vinit Khetani. "RDPC: Secure Cloud Storage with Deduplication Technique." In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 1280-1283. IEEE, 2020.
- Rashmi, R. Patil, and S. M. Sangve. "Public auditing system: Improved remote data possession checking protocol for secure cloud storage." In 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 75-80. IEEE, 2015.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.