International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 109

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


A Review on Auditing in Cloud

MS Tanuja Sali


Abstract: Cloud Computing is the usage of puddle of assets for distant users through internet that is easily available and expanded. The users accessing storage services of cloud has no direct control over their data, hence data security has become one of the major concerns in cloud. Current research work has already allowed the verification of data integrity without changing of the actual data file. This process was done by a trusted third party data auditing by an auditor. However, this scheme has from many common drawbacks. First, there is no proper authorization/authentication process between the auditor and cloud service provider and it may open the data contents to the auditor because it requires the server to send the local data blocks to the auditor. Consistency of the audits can be ensured by doing multiple auditing tasks simultaneously. To have real benefit, an audit program must be designed in such a way that it can be sustainable, both in terms of management commitment and to the ongoing development of talented and capable auditors. A management process addresses the content and scope of the audits, standards and regulations that apply to the facilities, use of audit protocols, the frequency of audits, and training of auditors is integral to an effective and sustainable auditing program. To securely introduce a reliable TPA the following two fundamental conditions have to be fulfilled 1) TPA must be able to audit the cloud data storage without asking the actual copy of data, and hence induce no extra load to the cloud user, 2) Also the third party auditing process should bring in no new problems towards user data privacy. In this paper, I explain importance of audit and its features. Different types of audit practices provide the opportunity to emphasize different aspects of the management program.


Keywords: Cloud auditing, Public Auditing, cloud data security, provable data possession, authorized auditing


Edition: Volume 5 Issue 5, May 2016,


Pages: 1312 - 1317


How to Cite this Article?

MS Tanuja Sali, "A Review on Auditing in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV163680, Volume 5 Issue 5, May 2016, 1312 - 1317

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Public Auditing'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Similar Articles with Keyword 'cloud data security'

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1696 - 1700

Data Security Policies in Cloud: A Survey

Kasundra Punitkumar R., Shikha J. Pachouly

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'auditing'

Downloads: 84

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'Public'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Similar Articles with Keyword 'Auditing'

Downloads: 84

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'data'

Downloads: 515 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'provable'

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

Share this Article

Similar Articles with Keyword 'possession'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1658 - 1661

Delay Tolerant Networks for Intermittently Connected Mobile Networks

M. Srikanth, A. Obulesh

Share this Article

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1434 - 1436

Method for Repossession of Content Based Video using Speech and Text Information

Manasi A. Kabade, U.A. Jogalekar

Share this Article

Similar Articles with Keyword 'authorized'

Downloads: 11 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article
Top