External integrity verification for outsourced big data in cloud and IoT: a big picture

Chang Liu*, Chi Yang, Xuyun Zhang, Jinjun Chen

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

166 Citations (Scopus)

Abstract

As cloud computing is being widely adopted for big data processing, data security is becoming one of the major concerns of data owners. Data integrity is an important factor in almost any data and computation related context. It is not only one of the qualities of service, but also an important part of data security and privacy. With the proliferation of cloud computing and the increasing needs in analytics for big data such as data generated by the Internet of Things, verification of data integrity becomes increasingly important, especially on outsourced data. Therefore, research topics on external data integrity verification have attracted tremendous research interest in recent years. Among all the metrics, efficiency and security are two of the most concerned measurements. In this paper, we will bring forth a big picture through providing an analysis on authenticator-based data integrity verification techniques on cloud and Internet of Things data. We will analyze multiple aspects of the research problem. First, we illustrate the research problem by summarizing research motivations and methodologies. Second, we summarize and compare current achievements of several of the representative approaches. Finally, we introduce our view for possible future developments.

Original languageEnglish
Pages (from-to)58-67
Number of pages10
JournalFuture Generation Computer Systems
Volume49
DOIs
Publication statusPublished - Aug 2015
Externally publishedYes

Keywords

  • Cloud computing
  • Data security
  • Big data
  • Internet of Things
  • Integrity verification
  • Public auditing

Fingerprint

Dive into the research topics of 'External integrity verification for outsourced big data in cloud and IoT: a big picture'. Together they form a unique fingerprint.

Cite this