A Survey on Proof of Retrievability for Cloud Data
Integrity and Availability: Cloud Storage State-of-
the-Art, Issues, Solutions and Future Trends
Tan Choon Beng1, Mohd Hanafi Ahmad Hijazi1, Yuto Lim2, Abdullah Gani3
1Facultyof Computing and Informatics, Universiti Malaysia Sabah, Jalan UMS, 88400 Kota Kinabalu, Sabah, Malaysia
2WiSE Laboratory, School of Information Science, Japan Advanced Institute of Science and Technology, Japan
3 Centre for Mobile Cloud Computing Research (C4MCCR), Faculty of Computer Science and Info Technology,
University of Malaya, Malaysia
Abstract: Cloud storage has emerged as the latest trend for data storage over the traditional storage method which consume
more storage spaces of data owner resources for backup and disaster recovery purposes. Due to the openness nature of cloud
storage, trustworthy to the storage providers remains a critical issue amongst data owners. Hence, a huge number of businesses
around the world remains choosing traditional storage method over cloud storage. This indicates a need for cloud storage
providers to adopt cloud integrity schemes to ensure the outsourced data is secured to gain trustworthiness from clients. There
are two main cloud integrity schemes available to ensure data integrity and availability: (i) Provable Data Possession (PDP)
and (ii) Proof of Retrievability (PoR). PDP and PoR are protocols designed for cloud storage to proof to clients that the stored
data is intact. Although PDP and PoR have similar functionality for providing cloud data integrity and availability, PoR is
found to be much better than PDP with respect to full data retrievability as PoR provides recovery to faulty or corrupted
outsourced data in which PDP does not cover. The objective of this paper is to examine the state-of-the-art of PoR and
subsequently to identify the issues of employing PoR on cloud storage and suggest possible solutions. We analyse available
PoR schemes. Then, the issues and challenges as a result of employing PoR specifically and cloud storage generally are
described. Some possible countermeasures to address the identified issues are suggested. Finally, the potential future work of
PoR schemes and future trends of cloud storage are presented.
Keywords: cloud computing, cloud storage integrity scheme, proof of retrievability, data integrity, data availability
1. INTRODUCTION not only for personal use, but also for business use as well as
information sharing. These facts show that cloud computing is
Cloud computing is a term we widely heard and used in our ubiquitous, where the services are available for everyone in
modern daily lives. According to definition of the term “cloud anywhere at any time, provided Internet connection.
computing” given by National Institute of Standards and
Technology (NIST), it is: Statistics provided by Statista, one of the international
online statistics databases, shown that the worldwide spending
“A model for enabling ubiquitous, convenient, on- on public cloud increases from year to year without inflation [3].
demand network access to a shared pool of configurable This statistic in other mean has shown the fact that the global
computing resources (e.g., networks, servers, storage, demand on cloud computing is increasing. The main reason lies
applications, and services) that can be rapidly provisioned and behind the increasing in demand of cloud computing over
released with minimal management effort or service provider traditional storage method is the benefits provided by cloud
interaction.” [1] computing itself, including efficient telecommute, data storage
and backup, as well as disaster recovery [4].
Generally, cloud computing is a distributed shared
service provided by cloud service provider (CSP), where shared Although the adoption of cloud computing is increasing
resources are available to its users, usually on a pay-as-you-go all the way, but not all corporates move to cloud. Indeed, there
basis. As for cloud computing, it can be categorized into three are obstacles that inhibit the adoption of cloud, for instances,
types, namely Platform as a Service (PaaS), Software as a vendor lock-in, reliability, privacy, pricing, interoperability, and
Service (SaaS), and Infrastructure as a Service (IaaS) [2]. Social the most important factor to mention, the security [5] [6]. But
media applications such Facebook, Twitter, YouTube, etc. are why security is so important in cloud? As thing goes open where
examples of cloud computing services we have been using since accessibility is ubiquitous to everyone, like cloud, there is a high
years ago. Besides, application such as Amazon Web Services, possibility that it will be taken advantages by some malicious
Google Apps, and Dropbox are also widely used in different adversaries such as hackers with no good means. If this huge
sectors of society around the world in 24/7 for various purposes, information pool is targeted by pro-hackers, serious damages
could be inflicted to not only the data owners, but other As a brief introduction, PoW was firstly introduced by
stakeholders as well. Even those well-known large-scale cloud [9] to allow a cloud user proof to a cloud in which the file is truly
service providers such as Amazon, Google, Microsoft and Sony owned by the user to prevent malicious adversaries from
could not escape and suffered from cloud incidents, in fact, they downloading it even without legal access provided. Since then,
contributed to more than half of overall [7]. When security is there were more PoW schemes been introduced by other
absent or weak in cloud storage, it could cause data leakage as researchers for the same purpose but with improvement in
someone else who is unauthorized can access the cloud data algorithm, for example [10], [11], and [12].
easily. For example, one of the infamous cloud data breach was
the incident happened in 2010, in which data stored in Microsoft Although PoW ensure only true data owner or
Business Productivity Online Suite (BPOS) was downloaded by legitimate shared data client is allowed to retrieve the stored data,
unauthorized cloud users [98] [99]. cloud server is always labeled untrustworthy. With respect to this,
PDP was introduced by [13] to allow the storage server to proof
Again, from the statistic provided by Statista, it is to its client that the stored data is actually possessed by the server
clearly shown that global spending on public cloud IaaS is with probabilistic possession guarantees. Since then, other PDP
always overwhelming the total of the other two (PaaS and SaaS) schemes such as [14], [15], and [16] were introduced to highlight
from year to year [2]. In other words, IaaS such as cloud storage cloud data integrity. Nevertheless, as PDP itself does not provide
is the main demand of the world for cloud computing. Therefore, recovery on corruption, hence stored data will be irretrievable if
by relating the increasing global demand to cloud [2], high corruption occurs, thus causing negative impacts to stakeholders
number of cloud incidents occurred in top cloud storage respectively such as data loss, financial damage, as well as loss
providers [7], and cloud security as the major obstacle which of trust from client.
inhabits the adoption of cloud in some corporates [5] [6], hence
it is clear that cloud information security is playing a significant PoR [17] that ensure cloud data integrity, similar to that
role in reducing or even solving most of the cloud incidents. of PDP, but with error-correcting codes (ECC) to allow recovery
of data corruption was introduced to address the limitation of
Information Systems Audit and Control Association PDP. Later, another PoR scheme was introduced by [18], in
(ISACA), had defined the term information security as: which erasure coding was applied to allow recovery in case of
data corruption. Meanwhile, limitations in [17] such as
“Ensures that within the enterprise, information is constrained number of challenges could be conducted by client
protected against disclosure to unauthorized users to the server to verify the integrity of a stored file, were then
(confidentiality), improper modification (integrity), and non- overcome in [18], provided unbounded number of PoR
access when required (availability).” [8] challenges.
In short, information security is composite of three main As more and more PoR schemes have been proposed in
elements as highlighted in ISACA Glossary of Terms [8], the recent years, there is a need to make a survey to summarize
confidentially, integrity and availability. Usually, these three the latest trend of PoR schemes. Even though there are some
components are known as CIA triad, but to avoid confusion with cloud storage security related survey papers been published, such
the term Central Intelligence Agency (CIA), the information as [19], [20], and [21], but they did not sufficiently address the
security’s CIA triad model sometimes is termed as AIC triad techniques, issues and trend on PoR schemes. Brief surveys on
instead. PoR specifically can be found in [22] and [23] with limited
number of PoR schemes surveyed and insufficient examples and
Similarly, as far as cloud storage security is concerned, details. Therefore, the motivation of this paper is to provide a
lots of cloud storage security schemes have introduced by survey on work of recent PoR schemes published from 2013 to
researchers since years ago. Generally, cloud data security 2016. The objectives are (i) to identify the current state of PoR
schemes can be categorized into three main categories, Proof of schemes, (ii) to identify issues of employing PoR on cloud
Ownership (PoW), Provable Data Possession (PDP), and Proof storage and potential solutions and (iii) to identify future works
of Retrievability (PoR). For a brief understanding of differences of PoR schemes.
between PoW, PDP and PoR, a general view of proofs in cloud
storage (provided from prover and shown to auditor) is shown in The key contributions of this survey paper, each of
Figure 1 below. which addressed each of the identified objective, are listed as
follow:
1. We provide a taxonomy on recent PoR schemes with
details by adapting several relevant attributes from [69]
while widen the categorization which fits for PoR
schemes.
2. Discussion and summarization on current cloud storage
security issues and countermeasure works correspond
to the security issues.
3. Discussion and identification of future trends of cloud
storage and future works of PoR schemes.
Figure 1: Difference Between PoW vs PDP / PoR This paper is organized as follows. Section 2 described
about methodology used in this survey. Section 3 discusses and
2
summarizes current cloud storage issues and vulnerabilities, as CSP after deletion. The reason is that, since at the moment this
well as countermeasure works had done by cloud security teams issue is happens, it indicates that the CSP is dishonest, and it is
corresponding to the security issues. In Section 4, latest existing no way for a dishonest CSP notice its client about the fact that
PoR schemes are discussed and a taxonomy of recent PoR they are possessing the deleted copy. Anyway, the best
schemes is presented. Section 5 presents the discussion and prevention of this issue is to choose a trustable CSP for data
identification on future trends of PoR schemes and cloud storage. outsourcing and apply privacy measures such as encryption to
Lastly, Section 6 concludes this paper. secure the outsourced data.
2. METHODOLOGY To ensure data privacy, encryption usually is the best
hit. Many large CSP such as Dropbox, Microsoft OneDrive and
In this section, the methodology used to conduct the survey of Google Drive are offering their services with encryption on
recent PoR schemes is described. outsourced data. Regarding to this, [72] and [73] have provided
some evidences on comparing Dropbox, OneDrive and Google
Firstly, to identify the risks of cloud storage and issues Drive. Dropbox uses 128-bit Secure Sockets Layer / Transport
of recent PoR schemes which related to data integrity and Layer Security (SSL/TLS) to encrypt data in transit and 256-bit
availability, several sources are referred which include online Advanced Encryption Standard (AES) encryption for data at rest
resources such as news, forums and articles, cloud vendors’ sites, [75]; Google Drive uses 256-bit SSL/TLS encryption for data in
as well as published works such as survey and technical papers. transit and 128-bit AES encryption for data at rest [76];
Online sources are used to obtain the latest information about OneDrive uses 128-bit SSL/TSL encryption for data in transit,
cloud storage such as associated risks and past cloud incidents. but 256-bit AES encryption for data at rest only available in
Meanwhile, survey and technical papers are used to identify the OneDrive for Business [77], which means data stored in personal
state-of-the-art of PoR related research, cloud storage risks, PoR OneDrive accounts are vulnerable as having no encryption on
related issues as well as future work for cloud and PoR. data at rest [74]. By looking at these facts, it is clear that which
CSP is more secure and otherwise. For encryption, it can be done
To ensure that this survey covers the latest trend of on either client side or server side, as where the encryption keys
cloud storage and PoR schemes, only articles of PoR schemes are kept. For a stronger security means in term of privacy, it is
published in recent years (2013-2016), are considered. Two better to go for client-side encryption rather than server-side
papers that first present PoRs, [17] and [18], are also considered. encryption although computation and processing time are much
A total of 97 articles and references are included in this survey. a burden on client device. This is to allow client to possess the
Most of the articles present work on PoR (43 articles). The encryption key for data security. However, decryption on
remaining are articles on PoW, PDP and cloud data integrity. All encrypted data would be impossible if client loss the encryption
the articles referred in this survey can be found in Scopus key. Nonetheless, for resource constraint devices like smart
database. phones and tablets, client-side encryption is not recommended
due to high computation cost needed.
3. STATE-OF-THE-ART CLOUD STORAGE AND
The next major risk mentioned in [70] is government
POR SCHEMES
intrusion. This issue is closely related to confidentiality of stored
data. Having information stored in cloud servers make ease for
In this section, discussions on current cloud storage issues, authorities to gain access to it without any knowledge of data
vulnerabilities and challenges as well as countermeasures are client. It is possible for some authorities to claim that data is
presented. Based on the work found in the literature, we identify owned by CSP, thus making CSP to legally obligated to hands-
the possible cloud storage issues, vulnerabilities and challenges, out needed or targeted data stored under their respective storage
together with some suggestions about their countermeasures. servers. Although some CSP will not easily hands out data
demanded by the authorities without a court order, but no entity
3.1 RISKS ASSOCIATED WITH CLOUD STORAGE can guarantee there will be no data leakage or confidential
disclosure of outsourced sensitive information. Nevertheless,
According to [70], there are several risks associated data privacy concern was significantly raised in 2013 when one
with cloud storage. First of all, using cloud storage, client data is of the contractor Edward Snowden from U.S. Department of
outsourced to cloud storage servers, meaning that the data is at Justice (DOJ), the National Security Agency (NSA), had
possession of someone else and has full control over it. Without exposed information indicating that NSA was using USA Patriot
any data integrity schemes, the outsourced data may be tampered, Act [79] to justify the bulk collection of data about millions of
modified, re-outsourced, and even deleted without notice by phone calls [78]. A suggestion of countermeasure is that
malicious CSP. Therefore, it is more trustworthy from client performing encryption on client side [85] before outsourcing
view that CSP adopts a PoR scheme to ensure stored data data to cloud storage servers. If confidential data has to be stored
integrity. Besides, as CSP is having full control over the stored in cloud servers, it should be encrypted first before being
data, the security of stored data lies within the responsibility of uploaded, else it is not advisable to store confidential data online.
CSP as data client has no physical control and access to the Even though it is not impossible for pros to break the encryption,
stored data. Better safe than sorry, data should be encrypted at however as it is costly and time consuming to do so, unless the
client side before being uploaded to cloud storage. Another thing data is the truly targeted by some authorities, else there is very
is stored data deletion. Regarding to this, as the CSP has full low possibility for them to do so [85].
control over the stored data, it may still possess by CSP as a
duplicate copy even data client has permanently deleted the file, Last but not least, outage of cloud storage servers is also
given reason for rollback deletion function. For this issue, there a major risk that requires serious concern. This issue is closely
is no way data clients can confirm their data is still possessed by
3
related to availability of stored data. When cloud storage is further emphasizing the importance of cloud integrity schemes
outage, all outsourced data is unavailable. Regarding to this, and thus the reason why PoR schemes should be adopted. As a
usually cloud storage servers’ outage is less likely or very rarely solution to ensure both storage, and communication efficiency,
to occurs, according to 99.99% guaranteed availability by CSP XOR based coding such as network coding which is widely
[71]. Nevertheless, it does not mean data outage won’t happens. adopted in communication network can be employed to replace
For examples, even those CSP titans like Microsoft [80], full replication, while computational performance of PoR using
Amazon [81] and Dropbox [82] were having their storage service XOR based coding can be enhanced by parallel processing.
outage. Although there is nothing major has been lost on a wide
scale during these outages, but these should have raise the With the emergence of Internet of Things (IoT), we
concern and awareness of both data client and CSP for cloud have many electronic devices like smart phones and tablets
storage outage risk. As a possible solution, synchronization of integrated to the Internet, and so to cloud storage services. We
cloud data with local devices should be always allowed and may need our smart phones or tablets to have access to our cloud
turned on, so that the latest possible version of data can be used storage account, working on outsourced storing documents using
in case of cloud storage outage. Nonetheless, frequent these resource constraint devices. Thus, there exists a challenge
synchronization of local devices with cloud data would cause a to design a lightweight data auditing scheme for mobile devices
high consumption of bandwidth. Figure 2 summarizes about the which are resource limited [15] [19]. Although people is working
issues and challenges of PoR schemes and cloud storage. on this, as we can see in the work of [49], the researchers have
proposed a lightweight data auditing scheme for resource
From what we have discussed in this sub-section, it can constraint devices like smart phones and tablets. However,
be summarized that cloud storage is having three main issues: according to researchers the scheme [49] needs more efficient
data integrity, data confidentiality and data availability. Out of constructions for less storage requirement and a lower
these three main issues, data integrity and availability are the communication cost. As mentioned in previous paragraph, XOR
most important factors as these are the pre-conditions of the based coding like network coding can be used to save more
existence of a cloud storage service [33]. Although data information using similar or less storage spaces and better
confidentiality is also important, but it is not as important as the communication performance.
other two factors, data availability and data integrity. In fact, not
all CSPs provide cryptography protect against stored data, for On the other hand, data integrity schemes such as PoR
example Microsoft OneDrive do not provide any encryption schemes are vulnerable to malicious threats and similarly cyber-
services on data at rest of personal accounts [77] to ensure data attacks that cause data loss. Some malicious threats include tag
confidentiality. This is the reason why we need PoR schemes forgery attack [69] [83] where malicious cloud storage servers
which ensure both integrity and availability of data stored in attempt to hide stored data damage and bypass auditing process,
cloud storage. data deletion attack [69] in situation where only tags are needed
for proof generation rather than data itself, and replace attack [69]
3.2 ISSUES OF POR WITH RESPECT TO CLOUD STORAGE where corrupted or deleted stored data block and tag pairs are
replaced with other valid pairs so to pass data auditing. For
From the previous sub-section, we have explained the reasons another thing, malicious storage servers may try to cache
why PoR schemes are needed in cloud storage. In this, sub- responses of precious passed auditing challenge to be replayed
section, issues associated with PoR schemes are discussed. in future auditing [53] [57]. Not limited to these attacks, it is
Although PoR schemes ensure data availability and data integrity, possible for a malicious storage server to act dishonest by pass
but in exchange several issues arise, such as efficiency, the auditing process using valid data, but providing corrupted
supportability of devices, malicious threats, and data stored data blocks during repair phase to construct a faulty new
deduplication issues. data blocks instead of recovery. This is known as pollution attack
[53] [69]. Besides, there is also a malicious threat known as data
First of all, we would like to address the efficiency leakage attack [69], where malicious cloud storage servers
issues regarding to computational, storage and communication attempt to extract stored data when verification is using
of cloud integrity schemes (e.g. PoR) for the stored data in cloud wiretapping. Nevertheless, [69] also suggested that data blocks
storage servers [69]. In general, data integrity schemes such as and metadata pairs should be constructed in such a way that they
PoR, preprocess the data before outsourcing it to cloud storage have strong binding with each other, while proof generation
servers. The data preprocessing is time and resource consuming. during data auditing should involves both data and metadata
Thus, a cloud storage service which has implemented cloud pairs as well as randomness factor in challenge-response
integrity schemes suffers from slower data storing process than mechanism. For example, [33] construct the coded block and
others which store data directly in storage servers without metadata in such a way that coded block is the index of
employ security measures. This is because additional data permutation list for recover back the original data for data
preprocessing such as employing erasure codes before storing retrieval using information stored in its metadata.
the data in storage servers takes time. Therefore, it is crucial for
a cloud integrity scheme to have a computational and The last issue of PoR to address here is data
communicational efficient construction to chase up the pace of deduplication. Data deduplication is a process of eliminates
lagging behind due to additional time spent on data redundant data copies in the cloud to saves storage spaces [84],
preprocessing. At the same time, the storage efficiency is also as where data deduplication is commonly adopted in PoW.
important as computational and communicational efficiency, as Meanwhile, PoR is making redundant copies at data blocks level
the cloud data growth rate is exponential [69]. This is a reason to provide recovery and retrievability. In general, PoR schemes
why replication of full data across distributed cloud servers [71] are contradicting the nature of cloud data deduplication as PoR
is no longer suitable and applicable in the near future, thus tends to form data redundancy while data deduplication tends to
4
eliminates redundant data. Faulty deduplication on data stored [59]. To the best of our knowledge, the work done on integrating
using PoR can cause permanent data loss whether partly or fully. PoR with deduplication is limited to static data only. Hence,
Although there are few PoR schemes have been proposed in future work is needed to allow dynamic operations in PoR while
recent years to integrate PoR schemes with data deduplication integrating with PoW as cloud data like documents stored in
where PoR integrate with PoW, for example [30], [44], [47], and Google Docs can be edited online smoothly and safely.
Issues and Challenges CSP has full control over outsourced
Computational, storage and
data
communication efficiency
Uncomplete data
High computation cost of deletion
dynamic PoR schemes for
resource-constraint devices Data
PoR Schemes Cloud Storage privacy/confidentiality of
Vulnerability on malicious data
threats and cyber attacks
Government
intrusion
Inefficient dynamic PoR with data
deduplication
Cloud storage outage
Figure 2: Summary of Issues and Challenges of PoR Schemes and Cloud Storage
and later, [18] was proposed in 2008 for unbounded number of
4. POR SCHEMES FOR CLOUD STORAGE times of PoR data integrity challenge (challenge client to provide
a proof), which is a limitation in [17]. Since then, many PoR
This section firstly shows the time line of PoR schemes. Then, schemes have been proposed by researchers. Figure 3 shows the
the details on PoR schemes proposed by researchers in recent time line of PoR schemes. In this paper, we consider only articles
years are reviewed based on several attributes in taxonomy. indexed by Scopus corresponding to PoR schemes proposed in
Lastly, the taxonomy about reviewed recent PoR schemes is recent years (2013-2016). Since we are only interested with the
tabulated in Table 1. recent PoR schemes, the schemes proposed before the year 2013
are not included in this paper except [17] and [18] as these two
The first PoR scheme was introduced by [17] in 2007 papers are widely referenced and contributed to the idea and
construction of PoR schemes.
Figure 3: Time Line of PoR Schemes
but with error correcting codes employed, it enable cloud data to
recover from corruption. Sentinel is a randomly-valued check
4.1 PRELIMINARY block embedded in encrypted file for storage verification [17].
Meanwhile, Message Authentication Code (MAC) is employed
Before the first PoR scheme [17] is proposed, availability of to determine whether the corruption is correctly recovered, while
outsourced data using replication throughout distributed servers its function is primitively to verify whether the stored file is
in cloud is very resource extensive, especially in this exponential subjected to tampering or not [17]. The function of the sentinel
data growth era. Basically, [17] is a sentinel based PoR scheme, embedded in data is for storage auditing purpose (storage
proposed not only to ensure availability of cloud data like PDP, verification); to verify if the data is entirely stored or otherwise.
5
Besides, the security of this stored file is ensured by means of Nature of data is an important attribute to look in as some CSPs
encryption; in addition to the way the sentinels are embedded provide storage of static data, while some others provide storage
into the encrypted file randomly [17], archive cannot distinguish of dynamic data. Hence, adoption of which PoR scheme in their
between sentinels and portions of original file (which blocks are cloud depending on their needs and the compatibility of PoR
sentinels and which blocks are data), making the storage servers schemes in term of dynamic operation supports such as update,
have no choice but to store the entrusted file properly. delete and insert operations on stored data. The founder of PoR
[17] as well as widely referenced model of PoR [18] are both
Nevertheless, due to the limitation of bounded number exhibit static data nature in their schemes, which means they do
of PoR challenge (number of times where client or auditor can not support dynamic operations. Similarly, PoR schemes such as
challenge storage servers to provide proof where the entrusted [30], [32], [33], [37] and [39] are PoR schemes deal with static
file is stored properly via PoR) in [17], two auditing schemes data. Meanwhile, PoR schemes which support for dynamic data
proposed in [18] to overcome the limitations, on which are operations include [24], [25], [31], [34], [35] and [36].
private audit by using pseudorandom functions (PRF), and
public audit by using Boneh-Lynn-Shacham signature (BLS The second attribute included in the taxonomy is cloud
signature). Meanwhile, both schemes used homomorphic server setup. There are mainly two ways of cloud storage server
authenticators (BLS and PRFs) to reduce response length by setup for PoR schemes; single server setup and multi-servers’
combining blocks and a number of authenticators into a single setup or distributed servers’ setup. Single server usually has a
aggregated block and authenticator. This is because better specification and bigger compared to multiple servers
homomorphic authenticators allow any entity to certify the which are comparably smaller. This is because single server has
output of a complex computation over a huge authenticated data to be very powerful and all-in-one to cover all needed
with only a short tag. Nevertheless, the private audit scheme functionalities such as proxy and storage. PoR schemes which
shown a shorter server response time compared to the public apply single server’s setup require the full data to be stored in a
audit scheme [18]. In term of recovery and data corruption single server, such as [40], [43], [44], [46] and [47]. On the other
resiliency, [18] used erasure coding to recover corrupted data. As hand, multiple servers have different functionalities, but often
time passes, more and more PoR schemes have been proposed. comes with lower specification. In cloud storage, multiple
In the next sub-section, we will review PoR schemes proposed servers’ setup not only allow better performance on large amount
in recent years, from 2013 to 2016. of concurrent storage-retrieval requests, but also represent the
resiliency of the cloud storage system against outages. PoR
4.2 POR SCHEMES PROPOSED IN RECENT YEARS schemes which apply distributed servers’ setup require the full
data to be partitioned or split into parts or chunks, and then
As we can see in the time line of PoR schemes shown in Figure distributed to store in multiple servers, for example [41], [42],
3, lots of PoR schemes have been proposed using different [45], [48] and [49]. Obviously, using distributed servers to store
approaches and techniques of implementation. To adopt the PoR a single file is much more resilient compared to store full data in
in real cloud environment, CSPs have to choose the one that best a single server in term of data availability. Although single server
fits their business objectives. By this mean, we constructed a setup may yield considerably lower communication cost as this
taxonomy of PoR schemes that describes the attributes of the requires no communication between servers, but this setup
surveyed papers; nature of data, cloud storage server setup, form requires the scheme to enable recovery of full data each time
of stored data, recovery, storage auditing, cryptography, as well server corruption happens. They also have the risk of server
as experimentation and analysis. The idea of taxonomy of this downtime problem. In short, distributed servers’ setup is better
paper adapted and modified the structure and several relevant in term of data availability and corruption resiliency than that of
attributes from [69]. As researchers [69] made their taxonomy single server setup for PoR schemes. As a matter of fact, PoR
based on cloud storage integrity schemes in general (PDP, PoR, schemes proposed in recent years that employ distributed servers’
etc.), and since we focus specifically on PoR schemes only, setup have outnumber the single server’s setup PoR schemes.
hence not all attributes in [69] are relevant to be assimilated in Nevertheless, there exists PoR schemes which can be
our paper. The following sub-section describes the taxonomy in implemented in both server setup method, for example [34].
details by summarizing recent PoR schemes.
The third attribute of the taxonomy is the form of stored
4.2.1 RELATED WORKS - RECENT POR SCHEMES data in cloud storage servers. There are lots of forms a file can
be stored in cloud storage servers, like data in their original form
In recent years, a number of PoR schemes have been proposed (not encrypted or coded) and distributed erasure coded data
by researchers to address cloud integrity issues. To gain a better chunks. Nevertheless, it is very difficult to tell which data storage
understanding of related works in PoR schemes, this section form is better as it depends on the techniques used in PoR
provides a taxonomy of recent PoR schemes corresponding to schemes which work on them such as erasure coding and
attributes as follows: nature of data, cloud server setup, form of replication. Depends on different techniques and requirements,
data stored, recovery, auditing, cryptography, and data can be stored as chunks across distributed servers, or even
experimentation and analysis. as forward error-correcting coded (FEC) data stored in just a
single server. Note that FEC is a code to allow the server to have
The first attribute included in the taxonomy of PoR schemes the ability to correct the error without needing for a
in this paper is nature of data. Data can be in mainly two forms, retransmission of the data, for example Hamming code. For PoR
static data and dynamic data. Static data is the data that stay schemes reviewed in this paper, we can categorize this attribute
unchanged after created for examples YouTube videos, whereas into (i) coded blocks with metadata or tags, (ii) data with
dynamic data is the data that consistently changing due to signature or tags, and (iii) others. The first form (i) coded blocks
updates such as word documents stored using Google Docs. and metadata or tags, can be seen as data that is broken into
6
pieces of chunks or parts, then these data chunks changed into data. Data auditing is initiated by client asking the storage servers
coded form (eg. 1100 ⨁ 0011 = 1111) after undergo some to provide proofs via PoR challenges. There are two ways of
operations such as XOR. Metadata or tags in this case served as storage auditing; (i) first is private auditing where data auditing
a key or information for some purpose such as decoding, for is conducted by data owners or shared data users, (ii) second is
example the number of bit ‘1’ in the coded data. PoR schemes public auditing conducted by third party auditor (TPA). For
with data stored as form (i) such [24], [25] and [26] are mostly privacy concern, private auditing is preferred as data is not
applied in distributed server’s setup, although there are some exposed to someone unknown or not trustable, whereas public
exception cases like [40], [58], and [60]. The second form (ii) auditing usually requires trust to TPA or implementation of
data with signature or tags, can be seen as data which its form cryptography schemes to the stored data. There are almost
un-change, but added with some codes (eg. parity bits), mostly similar in number of PoR schemes adopting public auditing such
to preserves their correctness (no corruption) known as metadata as [24], [32], [44], and [48] whereas private auditing such as [17],
or tags. For PoR schemes which have the data to be stored in the [40], [45], and [59]. Only a few PoR schemes adopting both
form (ii), we found that it is more favorable with single server’s private and public auditing such as [18], [35], and [38].
setup PoR schemes compared to other form for data to be stored
in cloud storage server mostly for the sake of saving The sixth attribute of the taxonomy is cryptography.
communication time, for example [37], [43], [44], [46] and [47]. Cryptography is applied on the stored data for privacy concern.
Lastly, some PoR schemes have their client’s data to be stored in Cryptographic techniques reviewed including encryption,
other forms (iii), not limited to [31], [34], and [41], but we can hashing and others. Generally, encryption is one of the widely-
see that the two forms (i) and (ii) outnumber than other forms used cryptography approach, where data is translated into secret
(iii). Nevertheless, it seems there is no problem in which form codes, where key(s) is needed to read the encrypted data via
data is more favorable to be stored in cloud storage servers, for decryption (reverse process of encryption). There are two main
those PoR schemes apply distributed servers’ setup. encryption techniques employed, (i) symmetric encryption that
uses the same key for both encryption and decryption process,
The forth attribute of the taxonomy is recovery. A and (ii) asymmetric encryption that uses different key for
common technique used for data recovery is by adding error encryption and decryption. Asymmetric encryption is stronger
correcting codes (ECC) such as cyclic redundancy check codes and more secure than symmetric encryption as it uses different
(CRC) and parity check codes. Usually, computing ECC keys for encryption and decryption, making brute-force cracking
consume less computation time and resources like storage and encrypted data a more difficult task. However, asymmetric
memory compared to other recovery techniques. Due to encryption consumed more time to compute compared to
simplicity and lower computation cost of ECC, we can see many symmetric encryption. As for application of encryption in PoR
PoR schemes are employing ECC, which including [17], [25], schemes, most of the work employed symmetric encryption
[31], [42], and [52]. However, ECC generally causes which include [17], [24], [26], [39], [40], [56], and [63]. For
considerably great increase in data size. For example, in parity another thing, although not as frequent as encryption, hashing is
check codes, each data bit has to be assigned a parity bit for error another cryptography approach used in PoR schemes. Generally,
checking. The second recovery technique is erasure coding. hashing is a one-way cryptographic function to transform data
Erasure coding is a type of coding by which data is split into into a shorter fixed-length value or key such as digital fingerprint
pieces, encoded with other data pieces, and stored across and checksum. Using a fine designed algorithm, reversing he
distributed storage servers. Not to mentioned, erasure coding hashing process to reveal the hashed data is nearly impossible.
contributes to lesser increase in data size, approximately 50% Examples of PoR schemes adopted hashing for the stored data
increase in data size, compared to ECC as well as replication. are [25], [31], [34], [35], and [52]. Meanwhile, there are some
Due to this minimal increase in data size, currently many PoR PoR schemes without adopting any cryptography approaches,
schemes are designed using erasure coding, for example [18], such as [33], [38], [41], and [55], most probably due to
[24], [32], [40], [55], and [63]. The third technique is network performance and efficiency concern.
coding (NC), which is widely used in data transmission, is
assimilated in PoR schemes [48], [57], and [64] due to its The seventh attribute of the taxonomy is
efficiency. The main idea of NC is conducting exclusive OR experimentation and analysis. For cloud storage integrity
(XOR) operation among data blocks to form a coded block. schemes like PoR schemes, there are a few methods can be used
Similar to erasure coding, NC only causes data to increase its for showing, proving and comparing the effectiveness and
size by around 50%. However, network coding is better than performances of the proposed schemes. As regards the
erasure coding in term of efficiency. This can be explain using a experimentation and analysis methods for PoR schemes,
data corruption scenario, where erasure coded data required the analytical solution, simulation, prototype, etc. are commonly
retrieval of full data before recovery can be applied. In NC coded used to show and compare performance of PoR schemes.
data on the other hand, only coded blocks which are constructed Analytical solution is method of showing the performance of
from the data blocks used to form the corrupted coded blocks are proposed or compared schemes, by giving a general description
needed for recovery. Other recovery techniques (such as about the performance of the schemes for any value of
dispersal coding and Slepian-Wolf coding) not limited to parameters [65]. As for simulation, it is also a method of showing
techniques mentioned are adopted in PoR schemes, for example the performance of proposed or compared schemes, but different
[54], [56], [60], and [61], while PoR schemes [27], [39], [51], with analytical solution in which simulation is a process of
and [53] have adopted more than one recovery techniques. imitation of the schemes in a real-world process over time with
specified parameters [66], [67]. Meanwhile, prototype is a
The fifth attribute of the taxonomy is storage auditing. preliminary product of a scheme designed to collect more
In PoR schemes, storage auditing is a method of verification to experimental or testing data before a better version of the
check either the cloud storage servers are properly storing clients’ schemes could be implemented [68]. Depending on many factors,
7
such as precision and accuracy of complexity analysis, is less relevant and lack of fairness in comparison. Hence,
compatibility and viability of simulation in real cloud performance comparison among the survey PoR schemes is not
environment, feasibility of prototype, judging which is the most conducted in this paper. Nevertheless, it is possible to look for
trustworthy proving and comparing method for PoR schemes is the trend of experimentation and analysis used in recent PoR
very difficult. Indeed, it is a very subjective question or topic to schemes. As for PoR schemes’ papers reviewed in this paper,
discuss. However, performance comparison among the surveyed obviously analytical and simulation approach are more or less
PoR schemes is less relevant and not very applicable, because similar in their use frequency, whereas prototype and other
the surveyed PoR schemes have different aspect of focus. Some methods are less likely to go favorable, not to mentioned how
PoR schemes are focusing on improving communication infrequent researchers shown their proposed PoR schemes’
(transmission) performance [26], whereas some are focusing on performances using more than one method.
error recovery computation performance [48]. Thus, comparing
the surveyed PoR schemes in term of computation performance
Table 1: Taxonomy of Recent PoR Schemes
Attributes Sub- References
Attributes
[17] A.Juels & B.S.Kaliski Jr., [18] H. Shacham & B. Waters, [26] J. Yuan & S. Yu,
[27] X. Song & H. Deng, [28] S. Sarkar & R. Safavi-Naini, [29] G. Yan et al., [30] J. Yuan & S. Yu,
[32] F. Armknecht et al., [33] T. P. Thao et al., [37] N. S. Chauhan & A. Saxena, [38] J. Zhang et al.,
Static [39] K. Omote et al., [42] A. Juels et al., [43] D. Liu & J. Zic, [44] Y. Shin et al., [45] B. Jianchao et al.,
[47] F. Rashid et al., [48] K. Omote et al., [50] M. H. Au et al., [51] K. Omote et al., [55] R. Du et al.,
Nature of
[57] T. P. Thao et al., [59] D. Vasilopoulos et al., [60] J. Lavauzelle & F. Levy-Dit-Vehel, [62] J. Li et
data
al., [63] B. Sengupta et al.
[24] E. Shi et al., [25] J. Li et al., [31] S. Rass, [34] M. I. Husain et al., [35] K. Huang et al., [40] D. Cash
et al., [41] M. Etemad & A. Küpçü, [46] M. S. Kiraz et al., [49] J. Li et al., [52] D. Tiwari & G. R.
Dynamic
Gangadharan, [53] Z. Ren et al., [54] N. Mishra et al., [56] Y. Wang et al., [58] J. Xu et al., [61] R.
Saxena & S. Dey, [64] K. Omote & T. P. Thao
[31] S. Rass, [37] N. S. Chauhan & A. Saxena, [40] D. Cash et al., [43] D. Liu & J. Zic, [44] Y. Shin et
Single server
al., [46] M. S. Kiraz et al., [47] F. Rashid et al., [58] J. Xu et al., [60] J. Lavauzelle & F. Levy-Dit-Vehel,
[17] A.Juels & B.S.Kaliski Jr., [18] H. Shacham & B. Waters, [24] E. Shi et al., [25] J. Li et al., [26] J.
Yuan & S. Yu, [27] X. Song & H. Deng, [28] S. Sarkar & R. Safavi-Naini, [29] G. Yan et al., [30] J.
Yuan & S. Yu, [32] F. Armknecht et al., [33] T. P. Thao et al., [35] K. Huang et al., [36] A. Miller et al.,
Cloud
[38] J. Zhang et al., [39] K. Omote et al.
storage Distributed
[41] M. Etemad & A. Küpçü, [42] A. Juels et al., [45] B. Jianchao et al., [48] K. Omote et al., [49] J. Li
server servers
et al., [50] M. H. Au et al., [51] K. Omote et al., [52] D. Tiwari & G. R. Gangadharan, [53] Z. Ren et al.,
setup
[54] N. Mishra et al., [55] R. Du et al., [56] Y. Wang et al., [57] T. P. Thao et al., [59] D. Vasilopoulos
et al., [61] R. Saxena & S. Dey
[62] J. Li et al., [63] B. Sengupta et al., [64] K. Omote & T. P. Thao
Either setup [34] M. I. Husain et al.
methods
PoR
[17] A.Juels &.S.Kaliski Jr., [24] E. Shi et al.
Schemes Coded
[25] J. Li et al., [26] J. Yuan & S. Yu, [33] T. P. Thao et al., [40] D. Cash et al., [45] B. Jianchao et al.,
blocks and
[48] K. Omote et al., [49] J. Li et al., [51] K. Omote et al., [53] Z. Ren et al., [55] R. Du et al., [58] J. Xu
metadata /
et al.
tags
[60] J. Lavauzelle & F. Levy-Dit-Vehel, [64] K. Omote & T. P. Thao
[18] H. Shacham & B. Waters, [27] X. Song & H. Deng, [28] S. Sarkar & R. Safavi-Naini, [29] G. Yan
Form of
et al., [30] J. Yuan & S. Yu, [32] F. Armknecht et al., [35] K. Huang et al., [36] A. Miller et al., [37] N.
data stored Data and
S. Chauhan & A. Saxena, [38] J. Zhang et al.
signature /
[39] K. Omote et al., [42] A. Juels et al., [43] D. Liu & J. Zic, [44] Y. Shin et al., [46] M. S. Kiraz et al.,
tags
[47] F. Rashid et al., [50] M. H. Au et al., [52] D. Tiwari & G. R. Gangadharan, [54] N. Mishra et al.,
[56] Y. Wang et al., [57] T. P. Thao et al., [61] R. Saxena & S. Dey, [62] J. Li et al.
[31] S. Rass, [34] M. I. Husain et al., [41] M. Etemad & A. Küpçü, [59] D. Vasilopoulos et al., [63] B.
Others
Sengupta et al.
Error [17] A.Juels & B.S.Kaliski Jr., [25] J. Li et al., [31] S. Rass, [34] M. I. Husain et al., [37] N. S. Chauhan
correcting & A. Saxena, [42] A. Juels et al., [47] F. Rashid et al., [52] D. Tiwari & G. R. Gangadharan, [59] D.
codes (ECC) Vasilopoulos et al., [62] J. Li et al.
[18] H. Shacham & B. Waters, [24] E. Shi et al., [26] J. Yuan & S. Yu, [29] G. Yan et al.
Erasure [30] J. Yuan & S. Yu, [32] F. Armknecht et al., [36] A. Miller et al., [38] J. Zhang et al.
coding [40] D. Cash et al., [41] M. Etemad & A. Küpçü, [44] Y. Shin et al., [49] J. Li et al.
[50] M. H. Au et al., [55] R. Du et al., [58] J. Xu et al., [63] B. Sengupta et al.
Recovery
Network [48] K. Omote et al., [57] T. P. Thao et al., [64] K. Omote & T. P. Thao
coding (NC)
[28] S. Sarkar & R. Safavi-Naini, [33] T. P. Thao et al., [35] K. Huang et al., [43] D. Liu & J. Zic, [45]
Others B. Jianchao et al., [46] M. S. Kiraz et al., [54] N. Mishra et al., [56] Y. Wang et al, [60] J. Lavauzelle &
F. Levy-Dit-Vehel, [61] R. Saxena & S. Dey
More than [27] X. Song & H. Deng, [39] K. Omote et al., [51] K. Omote et al., [53] Z. Ren et al.
one
8
technique
[24] E. Shi et al., [25] J. Li et al., [26] J. Yuan & S. Yu, [27] X. Song & H. Deng, [28] S. Sarkar & R.
Safavi-Naini, [29] G. Yan et al., [30] J. Yuan & S. Yu, [32] F. Armknecht et al., [34] M. I. Husain et al.,
Public [44] Y. Shin et al., [46] M. S. Kiraz et al., [48] K. Omote et al., [49] J. Li et al., [50] M. H. Au et al., [52]
D. Tiwari & G. R. Gangadharan, [53] Z. Ren et al., [54] N. Mishra et al., [56] Y. Wang et al., [57] T. P.
Thao et al., [61] R. Saxena & S. Dey
Storage [17] A.Juels & B.S.Kaliski Jr., [31] S. Rass, [33] T. P. Thao et al., [36] A. Miller et al., [37] N. S. Chauhan
auditing & A. Saxena, [39] K. Omote et al., [40] D. Cash et al., [41] M. Etemad & A. Küpçü, [42] A. Juels et al.,
Private [43] D. Liu & J. Zic, [45] B. Jianchao et al, [47] F. Rashid et al., [51] K. Omote et al., [55] R. Du et al.,
[58] J. Xu et al., [59] D. Vasilopoulos et al., [60] J. Lavauzelle & F. Levy-Dit-Vehel, [62] J. Li et al.,
[63] B. Sengupta et al., [64] K. Omote & T. P. Thao
Both [18] H. Shacham & B. Waters, [35] K. Huang et al., [38] J. Zhang et al.
methods
Asymmetric [18] H. Shacham & B. Waters, [32] F. Armknecht et al., [36] A. Miller et al.
encryption [46] M. S. Kiraz et al., [50] M. H. Au et al., [53] Z. Ren et al., [64] K. Omote & T. P. Thao
[17] A.Juels & B.S.Kaliski Jr., [24] E. Shi et al., [26] J. Yuan & S. Yu, [28] S. Sarkar & R. Safavi-Naini,
[29] G. Yan et al., [30] J. Yuan & S. Yu, [37] N. S. Chauhan & A. Saxena, [39] K. Omote et al., 40] D.
Symmetric Cash et al., [42] A. Juels et al., [43] D. Liu & J. Zic, [45] B. Jianchao et al., [47] F. Rashid et al., [48] K.
encryption Omote et al., [51] K. Omote et al., [54] N. Mishra et al., [56] Y. Wang et al., [58] J. Xu et al., [59] D.
Cryptograp
Vasilopoulos et al., [60] J. Lavauzelle & F. Levy-Dit-Vehel, [61] R. Saxena & S. Dey, [62] J. Li et al.,
hy
[63] B. Sengupta et al.
Others [25] J. Li et al., [27] X. Song & H. Deng
(Hashing, [31] S. Rass, [34] M. I. Husain et al., [35] K. Huang et al., [49] J. Li et al., [52] D. Tiwari & G. R.
etc.) Gangadharan
[33] T. P. Thao et al., [38] J. Zhang et al., [41] M. Etemad & A. Küpçü, [44] Y. Shin et al., [55] R. Du et
None
al., [57] T. P. Thao et al.
[17] A.Juels & B.S.Kaliski Jr., [18] H. Shacham & B. Waters, [25] J. Li et al., [26] J. Yuan & S. Yu, [28]
S. Sarkar & R. Safavi-Naini, [31] S. Rass, [37] N. S. Chauhan & A. Saxena, [39] K. Omote et al., [40]
Analytical D. Cash et al., [41] M. Etemad & A. Küpçü, [44] Y. Shin et al., [45] B. Jianchao et al., [46] M. S. Kiraz
et al., [50] M. H. Au et al., [51] K. Omote et al., [56] Y. Wang et al., [58] J. Xu et al., [59] D. Vasilopoulos
et al., [64] K. Omote & T. P. Thao
Experiment [24] E. Shi et al., [30] J. Yuan & S. Yu, [33] T. P. Thao et al., [34] M. I. Husain et al., [35] K. Huang et
ation and al., [36] A. Miller et al., [38] J. Zhang et al., [42] A. Juels et al., [47] F. Rashid et al., [48] K. Omote et
Simulation
analysis al., [52] D. Tiwari & G. R. Gangadharan, [53] Z. Ren et al., [55] R. Du et al., [57] T. P. Thao et al., [60]
J. Lavauzelle & F. Levy-Dit-Vehel, [61] R. Saxena & S. Dey, [62] J. Li et al., [63] B. Sengupta et al.
Prototype [32] F. Armknecht et al., [43] D. Liu & J. Zic, [54] N. Mishra et al.
Others [49] J. Li et al.
More than [27] X. Song & H. Deng, [29] G. Yan et al.
one method
In summary, all PoR schemes are composing of all the help data auditing). For cryptography, it is a give and take or
seven attributes of the taxonomy discussed. From the taxonomy, trade-off between efficiency and security, but our review had
we discovered that the construction of PoR is moving towards shown most PoR schemes do provide a minimum of security
to dynamic data nature, as dynamic PoR suits not only dynamic with symmetric encryption. Lastly, it is easier for other
data, but also compatible with static data which requires no researchers to do comparison between theirs and those reviewed
update. On the other hand, distributed servers’ setup is more if analytical method is used for experimentation and analysis
prominent due to data corruption resiliency and backup towards efficiency of PoR schemes.
compared to single server’s setup. Meanwhile, all form of data
stored seems work well in PoR schemes which employed 5. FUTURE TRENDS OF POR SCHEMES AND
distributed servers’ setting, but coded blocks and metadata or CLOUD STORAGE
tags form seems to be more secure, as data is not stored exactly
the same form (for example, data such as 1100 is coded and 5.1 FUTURE TRENDS OF POR SCHEMES
stored as 1111) requires malicious adversary to work harder to
retrieve the data. In term of recovery, although erasure coding is New issues and challenges are emerging associated with the
still leading the trend, but in future, network coding might be a emergence of new technologies. Hence it is important to keep up
good choice for PoR construction, as its resource and the pace with evolution of information technologies.
computation efficiency in data recovery process compared to
erasure coding. For storage auditing, it is very difficult to tell Corresponding to several issues of PoR schemes
which is more prominent, but it would be better if both public identified in Section 3, there are research gaps left for future
and private auditing are made selectable in a PoR scheme to works need to be conducted to address those issues. Firstly, geo-
fulfill the wide variety needs of different users worldwide (some location of outsourced data, which is the actual location of
users concerns privacy, whereas some busy users need TPA to servers where the data is stored [69]. For example, Dropbox
cloud storage are hosted in data centers across the United States.
9
As mentioned in previous section, some authorities may have Finally, work on lightweight dynamic data auditing for
access to the data hosted in their countries with the use of law resource constraint devices such as mobile phones [19] need to
enforcement. Therefore, it is important for CSP to provide data be conducted. Generally, dynamic operation such as edit, delete,
clients information about where the outsourced data is stored. At and insert operation on online stored data is considerably
the same time, there is a need to ensure stored data is not resource extensive and timely [19], not to mentioned mobile
migrated to data center hosted in other region or even re- devices like smart phones, but even for laptops as well. Looking
outsourcing to other cheaper storage vendor [69] without from users’ perspective, for editing documents on Google Docs
providing notice to data client or agreement from data client. In using laptops, lagging is always a critic point. It shows a clear
future PoR schemes, geo-location of stored data should be picture where dynamic operation is very resource extensive, and
considered one of the integrity factor to be checked during data hence the case is applied in mobile device even worse situation.
auditing challenges. Therefore, it is crucial to involve efficient algorithm in PoR
schemes for dynamic updates, hence benefiting mobile device
Secondly, assured deletion [69] should be considered in users by affording lightweight mobile PoR schemes with
future PoR schemes as well. Assured deletion of data means dynamic operations enabled.
upon delete action done by data client, no roll-back can be done
and the data is deleted entirely without any backup copies 5.2 FUTURE TRENDS OF CLOUD STORAGE
remain in cloud servers. The assured deletion mentioned should
include permanent deletion of targeted data, at the same time With the emergence of Software Defined Networking (SDN), a
other versions of data that shares common data should be remain network protocol that allows centralized control of network
unaffected. This means that after permanent deletion operation applications and devices [89], cloud services can be made more
is performed on the targeted version of data, it should be made efficient by adopting SDN [90]. One of the benefits of
not only permanently inaccessible, but also permanently integrating cloud services with SDN is cross-storage in various
unrecovered after a period of agreed deletion unroll time, in geo-located servers [88]. The general concept of cross-storage is
order to ensure data integrity. It is important to prevent malicious applying software-defined storage [91], frankly speaking data
CSP from secretly keeping a copy of deleted data for some center plus SDN. As regards to the nature of centralizing in SDN
reasons without agreement from data client. concept to applied in storage services, storage managing can be
made increased efficiency and reduced complexity. Stick to the
Thirdly, deduplication [69] as mentioned in previous point of cross-storage, there are few examples including multi-
section as well, should be included in future PoR schemes, but clouds, hybrid clouds, meta-clouds and clouds federations
the idea here is slightly different from [69]. The main idea here provided in [87]. As regard to this, many CSP titans like
is to integrate PoR scheme with PoW schemes. In order to ensure Microsoft [90] and IBM [92] are working on cross-cloud, hence
only legitimate data clients are able to fully retrieve the indicates the future direction of cloud storage.
outsourced data without the risk of data lost and data leakage
due to eavesdropping, PoR scheme needs to properly integrate Next, machine learning and artificial intelligence (AI)
with PoW scheme which employed deduplication. As mentioned will be the future trend of cloud storage [94] [95]. Although
in previous section, there are some works done by researchers thorough application of machine learning and AI, especially on
for PoR schemes that allow deduplication [30], [44], [47], [59], cloud storage still at the stage of infancy, but the works have
but computation and storage efficiency is still left a problem. In shown some preliminary results. One of the example is Google’s
short, PoR and PoW are mutually contradict in nature, thus AlphaGo, an AI for a board game called Go, developed using
future work is still needed to efficiently integrated PoR with deep learning and other techniques [93]. Besides, systems like
PoW schemes. Cortana from Microsoft and Siri from Apple are also products
from researches in the field of machine learning and AI. From
Another future work of PoR schemes is efficient and the rise of machine learning and AI, the way of storing and
low resource cost in term of storage and memory usage for managing big data in cloud may change in near future, and thus
client-side encryption [85]. This has been mentioned in Section the future trend of cloud storage. For example, deep learning can
2 that it is still a risk to have an untrusted storage provider to be integrated in dynamic storage system for gaining more
encrypt outsourced data and at the same time keeping the storage capacity at a lower cost. Enhanced security and
cryptographic keys. If malicious cloud servers intend to extract reliability of cloud storage can be expected by employing AI and
stored data secretly, with the keys hold in hand, information can machine learning to prevent data loss and smart security features
be easily decrypted and extracted out the stored data without to detect data loss during transit in hybrid storage clouds or
anyone notice. If this happens, data confidentially is loss, as within cloud [100].
there is no more privacy. This shows the importance of enabling
client-side encryption for not letting CSP to hold the keys, but Besides, cloud-to-cloud backup will become the norm
the main problem associated with this is computational and in near future [96]. Cloud-to-cloud backup is a process where
resources efficiency. There is no assurance that client device is data stored in a cloud is backup by copying it to another cloud
very high end and with unlimited resources (storage and memory) [97]. Even with many recovery technologies invented, but the
that allow heavy computation of encryption at client-side. Hence, stored data is still exposed to the risk of data loss due to hardware
this left a future work for PoR schemes to allow efficient and failure. Imagine if only a copy of data is stored in the data center
low-cost resource consumption, so that even a resource- without backup, when the data center is struck by disaster such
constraint device of client can afford client-side encryption in as fire or flood, the stored data will never be recovered as storage
PoR schemes. hardware is destroyed. Nevertheless, as cloud-to-cloud backup
which creates more duplicates that is contradict with
10
deduplication technologies including PoW, further research is malicious users to gain benefits, for example patent stealing or
needed to allow a secured cloud-to-cloud backup. credential information leaking. Encryption could be the choice
for data privacy protection. Nevertheless, efficiency of intrusion
Last but not least, cloud security will be considerably detection systems for guarding a large-scale system like cloud
improved in the future [95]. As the emergence as many new storage and cloud services have to be greatly improved for
technologies to integrate with cloud, the openness nature of security concern. One way to do this is to adapt AI and machine
cloud which should be the benefits but also become threats to its learning [100] in the field of cloud security for better intrusion
users. In general, anything that is open is insecure as anyone also detection and prevention. Real-time encryption technology [86]
have access to it, including malicious users like hackers. By and real-time efficient defensive system can be the solutions for
integrating other new technologies into cloud, more cloud cloud based malicious threats in the future. Figure 4 below
services can be delivered to cloud users, but weakness or summarizes about the future work of PoR schemes and future
security holes of those technologies may be taken advantage by trends of cloud storage.
Geo-location information Future Trends
Software-Defined Storage
Assured deletion
Cloud security
Efficient dynamic PoR
with deduplication
Client-side encryption PoR Schemes Cloud Storage Cloud-to-cloud backup
Lightweight dynamic PoR
schemes for resource- Machine learning and
constraint devices AI for cloud storage
Figure 4: Summary of Future Work of PoR Schemes and Future Trends of Cloud Storage
6. CONCLUSION [6] B. Nedelcu, S. Madalina-Elena, T. Ioan-Florentin, T.
Smaranda-Elena, and V. Alin, “Cloud Computing and its
In conclusion, cloud storage has been introduced to lessen the Challenges and Benefits in the Bank System,” Database
burden of local storage including management and maintenance Syst. J., vol. VI, no. 1, pp. 44–58, 2015.
cost, but the existence of cloud storage itself required specific [7] R. Ko, S. Lee, and V. Rajan, “Cloud Computing
concern about integrity of outsourced data. Regrading to this, Vulnerability Incidents: A Statistical Overview,” Cloud
many data integrity schemes especially PoR schemes, have been Secur. Alliance, p. 21, 2013.
proposed by researchers, to ensure data availability and data [8] ISACA, “Isaca,” Glossary, pp. 1–103, 2015.
integrity. This paper presents the survey on state-of-the-art of [9] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg,
PoR schemes, published in 2013-2016. the issues of applying “Proofs of Ownership in Remote Storage Systems,” Proc.
PoR has also been identified. Some possible future work to 18th ACM Conf. Comput. Commun. Secur., pp. 491–500,
address the identified issues are also presented. In addition, 2011.
current cloud storage issues and vulnerabilities together with [10] C. M. Yu, C. Y. Chen, and H. C. Chao, “Proof of ownership
countermeasures are also discussed. in deduplicated cloud storage with mobile device
efficiency,” IEEE Netw., vol. 29, no. 2, pp. 51–55, 2015.
REFERENCES [11] J. Hur, D. Koo, Y. Shin, and K. Kang, “Secure Data
Deduplication with Dynamic Ownership Management in
Cloud Storage,” IEEE Trans. Knowl. Data Eng., vol. 28,
[1] P. Mell and T. Grance, “The NIST definition of cloud
no. 11, pp. 3113–3125, 2016.
computing,” NIST Spec. Publ., vol. 145, p. 7, 2011.
[2] J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing [12] L. González-Manzano and A. Orfila, “An efficient
Basics,” Build. Infrastruct. Cloud Secur., vol. 1, pp. 3–22, confidentiality-preserving Proof of Ownership for
2014. deduplication,” J. Netw. Comput. Appl., vol. 50, pp. 49–59,
2015.
[3] "Public cloud infrastructure spending worldwide 2015-
[13] G. Ateniese, R. Burns, and J. Herring, “Provable Data
2026 | Statistic", Statista, 2017. [Online]. Available:
Possession at Untrusted Stores,” Proc. 14th …, no. 1, pp.
https://www.statista.com/statistics/507952/worldwide- 598–610, 2007.
public-cloud-infrastructure-hardware-and-software- [14] R. Mukundan, S. Madria, and M. Linderman, “Efficient
spending-by-segment/. [Accessed: 15- Nov- 2016]. integrity verification of replicated data in cloud using
[4] I. Baciu, “Advantages and disadvantages of cloud homomorphic encryption,” Distrib. Parallel Databases,
computing services, from the employee’s point of view,” vol. 32, no. 4, pp. 507–534, 2014.
no. 13, pp. 95–101, 2015. [15] C. Lin, Z. Shen, Q. Chen, and F. T. Sheldon, “A Data
[5] Quest Technology Management for Business, “The Integrity Verification Scheme in Mobile Cloud Computing,”
Benefits and Challenges of Cloud Computing,” vol. 32, no. J. Netw. Comput. Appl., vol. 77, pp. 146–151, 2017.
7, p. 2015, 2015. [16] Y. Wang, Q. Wu, B. Qin, S. Tang, W. Susilo, and S.
11
Member, “Online / Offline Provable Data Possession,” Proc. 2014 ACM SIGSAC Conf. Comput. Commun. Secur.,
IEEE Trans. Inf. Forensics Secur., vol. 12, no. 5, pp. 1182– pp. 831–843, 2014.
1194, 2017. [33] T. P. Thao, L. C. Kho, and A. O. Lim, “SW-POR: A Novel
[17] A. Juels and B. S. Kaliski Jr., “Pors: Proofs of retrievability
POR Scheme Using Slepian-Wolf Coding for Cloud
for large files,” Proc. ACM Conf. Comput. Commun. Secur.,
pp. 584–597, 2007. Storage,” 2014 IEEE 11th Intl Conf Ubiquitous Intell.
[18] H. Shacham and B. Waters, “Compact proofs of Comput. 2014 IEEE 11th Intl Conf Auton. Trust. Comput.
retrievability,” J. Cryptol., vol. 26, no. 3, pp. 442–483, 2014 IEEE 14th Intl Conf Scalable Comput. Commun. Its
2008. Assoc. Work., pp. 464–472, 2014.
[19] M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. [34] M. I. Husain, S. Y. Ko, S. Uurtamo, A. Rudra, and R.
Khan, “A review on remote data auditing in single cloud Sridhar, “Bidirectional data verification for cloud storage,”
server: Taxonomy and open issues,” J. Netw. Comput.
J. Netw. Comput. Appl., vol. 45, pp. 96–107, 2014.
Appl., vol. 43, pp. 121–141, 2014.
[20] S. G. Worku, T. Zhong, and Z. G. Qin, “Survey on cloud [35] K. Huang, J. Liu, M. Xian, H. Wang, and S. Fu, “Enabling
data integrity proof techniques,” Proc. 2012 7th Asia Jt. dynamic proof of retrievability in regenerating-coding-
Conf. Inf. Secur. AsiaJCIS 2012, pp. 85–91, 2012. based cloud storage,” 2014 IEEE Int. Conf. Commun. Work.
[21] A. Singh and K. Chatterjee, “Cloud security issues and ICC 2014, pp. 712–717, 2014.
challenges: a survey Cloud security issues and challenges: [36] A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz,
a survey,” J. Netw. Comput. Appl., vol. 79, no. November “Permacoin: Repurposing bitcoin work for data
2016, pp. 88–115, 2016.
preservation,” Proc. - IEEE Symp. Secur. Priv., pp. 475–
[22] A. M. Jadhav and D. P. Gadekar, “A Survey on Proof of
Retrievability and its Techniques,” Int. J. Eng. Tech., vol. 490, 2014.
4, no. Iii, pp. 269–272, 2016. [37] N. S. Chauhan and A. Saxena, “A robust scheme on proof
[23] M. T. Student, “A Survey on Public Auditing With a Proof of data retrievability in cloud,” Proc. 2014 Int. Conf. Adv.
of Retrievability in Secure Cloud Storage,” Int. J. Mag. Comput. Commun. Informatics, ICACCI 2014, pp. 665–
Eng. Technol. Manag. Res., vol. 2, no. March, pp. 118–125, 671, 2014.
2015.
[38] J. Zhang, W. Tang, and J. Mao, “Efficient public
[24] E. Shi, E. Stefanov, and C. Papamanthou, “Practical
verification proof of retrievability scheme in cloud,”
Dynamic Proofs of Retrievability,” CCS ’13 Proc. 2013
Cluster Comput., vol. 17, no. 4, pp. 1401–1411, 2014.
ACM SIGSAC Conf. Comput. Commun. Secur., pp. 325–
[39] K. Omote and T. P. Thao, “A New Efficient and Secure
336, 2013.
POR Scheme Based on Network Coding,” 2014 IEEE 28th
[25] J. Li, X. Tan, X. Chen, and D. S. Wong, “An efficient proof
Int. Conf. Adv. Inf. Netw. Appl., 2014.
of retrievability with public auditing in cloud computing,”
[40] D. Cash, A. Küpçü, and D. Wichs, Dynamic Proofs of
Proc. - 5th Int. Conf. Intell. Netw. Collab. Syst. INCoS
Retrievability via Oblivious RAM. Journal of Cryptology,
2013, pp. 93–98, 2013.
2015.
[26] J. Yuan and S. Yu, “Proofs of retrievability with public
[41] M. Etemad and A. Küpçü, “Generic Efficient Dynamic
verifiability and constant communication cost in cloud,”
Proofs of Retrievability,” Cryptol. ePrint Arch., pp. 85–96,
Cloud Comput. ’13 Proc. 2013 Int. Work. Secur. cloud
2015.
Comput., pp. 19–26, 2013.
[42] A. Juels, J. Kelley, R. Tamassia, and N. Triandopoulos,
[27] X. Song and H. Deng, “Lightweight proofs of retrievability
“Falcon Codes: Fast, Authenticated LT Codes (Or :
for electronic evidence in cloud,” Inf., vol. 4, no. 3, pp.
Making Rapid Tornadoes Unstoppable),” Ccs ’15, pp.
262–282, 2013.
1032–1047, 2015.
[28] S. Sarkar and R. Safavi-Naini, “Proofs of retrievability via
[43] D. Liu and J. Zic, “Proofs of encrypted data retrievability
fountain code,” Lect. Notes Comput. Sci. (including Subser.
with probabilistic and homomorphic message
Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol.
authenticators,” Proc. - 14th IEEE Int. Conf. Trust. Secur.
7743 LNCS, pp. 18–32, 2013.
Priv. Comput. Commun. Trust. 2015, vol. 1, pp. 897–904,
[29] G. Yan, Y. F. Zhu, C. X. Gu, Y. H. Zheng, and J. L. Fei,
2015.
“An efficient proof of retrievability scheme for fully
[44] Y. Shin, D. Koo, J. Hur, and J. Yun, “Secure proof of
homomorphic encrypted data,” J. Networks, vol. 8, no. 2,
storage with deduplication for cloud storage systems,”
pp. 339–344, 2013.
Multimed. Tools Appl., 2015.
[30] J. Yuan and S. Yu, “Secure and constant cost public cloud
[45] B. Jianchao, L. Huixia, L. Shoushan, Z. Yaxing, and L.
storage auditing with deduplication,” 2013 IEEE Conf.
Wei, “Proof of retrievability based on LDPC codes,” J.
Commun. Netw. Secur. CNS 2013, pp. 145–153, 2013.
China Univ. Posts Telecommun., vol. 22, no. 4, pp. 17–25,
[31] S. Rass, “Dynamic Proofs of Retrievability from
2015.
Chameleon-Hashes,” Secur. Cryptogr. (SECRYPT), 2013
[46] M. S. Kiraz, I. Sertkaya, and O. Uzunkol, “An efficient ID-
Int. Conf., 2013.
based message recoverable privacy-preserving auditing
[32] F. Armknecht, J.-M. Bohli, G. O. Karame, Z. Liu, and C.
A. Reuter, “Outsourced Proofs of Retrievability,” CCS ’14
12
scheme,” 2015 13th Annu. Conf. Privacy, Secur. Trust. [61] R. Saxena and S. Dey, “Cloud Audit: A Data Integrity
PST 2015, pp. 117–124, 2015. Verification Approach for Cloud Computing,” Procedia
[47] F. Rashid, A. Miri, and I. Woungang, “Proof of Storage for Comput. Sci., vol. 89, pp. 142–151, 2016.
Video Deduplication in the Cloud,” Proc. - 2015 IEEE Int. [62] J. Li, J. Li, D. Xie, and Z. Cai, “Secure Auditing and
Congr. Big Data, BigData Congr. 2015, pp. 499–505, Deduplicating Data in Cloud,” IEEE Trans. Comput., vol.
2015. 65, no. 8, pp. 2386–2396, 2016.
[48] K. Omote and T. P. Thao, “MD-POR: Multisource and [63] B. Sengupta, S. Bag, S. Ruj, and K. Sakurai, “Retricoin:
Direct Repair for Network Coding-Based Proof of Bitcoin Based on Compact Proofs of Retrievability,” Proc.
Retrievability.,” Int. J. Distrib. Sens. Networks, vol. 2015, 17th Int. Conf. Distrib. Comput. Netw., p. 14:1--14:10,
pp. 1–14, 2015. 2016.
[49] J. Li, X. Tan, X. Chen, D. S. Wong, and F. Xhafa, “OPoR: [64] K. Omote and T. P. Thao, “D2-POR : Direct Repair and
Enabling proof of retrievability in cloud computing with Dynamic Operations in Network Coding-Based Proof of
resource-constrained devices,” IEEE Trans. Cloud Retrievability,” IEICE Trans. Inf. Syst., no. 4, pp. 816–829,
Comput., vol. 3, no. 2, pp. 195–205, 2015. 2016.
[50] M. H. Au, Y. Mu, and H. Cui, “Proof of retrievability with [65] P. Impact, T. Changes, W. Paper, and R. S. Company,
public verifiability resilient against related-key attacks,” “Simulation versus Analytic Modeling in Large
IET Inf. Secur., vol. 9, no. 1, pp. 43–49, 2015. Computing Environments.”
[66] S. Sahin, “Computer simulations in science education:
[51] K. Omote and P. T. Tran, “ND-POR: A POR based on
Implications for distance education,” Turkish Online J.
network coding and dispersal coding,” IEICE Trans. Inf. Distance Educ., vol. 7, no. 4, pp. 132–146, 2006.
Syst., vol. E98D, no. 8, pp. 1465–1476, 2015. [67] A. Maria, “Introduction to modelling and simulation,”
[52] D. Tiwari and G. R. Gangadharan, “A novel secure cloud Winter Simul. Conf., pp. 7–13, 1997.
storage architecture combining proof of retrievability and [68] E. J. Christie et al., “Prototyping Strategies: Literature
revocation,” 2015 Int. Conf. Adv. Comput. Commun. Review and Identification of Critical Variables,” Am. Soc.
Informatics, ICACCI 2015, pp. 438–445, 2015. Eng. Educ. pp. 01154-22. 2012., pp. 1154–1122, 2012.
[69] F. Zafar et al., “A survey of cloud computing data integrity
[53] Z. Ren, L. Wang, Q. Wang, and M. Xu, “Dynamic proofs
schemes: Design challenges, taxonomy and future trends,”
of retrievability for coded cloud storage systems,” IEEE Comput. Secur., vol. 65, 2017.
Trans. Serv. Comput., vol. PP, no. 99, pp. 1–13, 2015. [70] D. Sullivan, "Top Ten Major Risks Associated With Cloud
[54] N. Mishra, R. Bhardwaj, and R. Kumar, “Data traceability Storage", Cloudwards, 2017. [Online]. Available:
in cloud environment,” Int. Conf. Comput. Commun. https://www.cloudwards.net/top-ten-major-risks-
Autom. ICCCA 2015, pp. 674–677, 2015. associated-with-cloud-storage/. [Accessed: 05- Apr- 2017].
[55] R. Du, L. Deng, J. Chen, K. He, and M. Zheng, “Proofs of [71] "Amazon Simple Storage Service (S3) — Cloud Storage
— AWS", Amazon Web Services, Inc., 2017. [Online].
ownership and retrievability in cloud storage,” Proc. -
Available: https://aws.amazon.com/s3/faqs/. [Accessed:
2014 IEEE 13th Int. Conf. Trust. Secur. Priv. Comput. 06- Apr- 2017].
Commun. Trust. 2014, pp. 328–335, 2015. [72] "How secure are Dropbox, Microsoft OneDrive, Google
[56] Y. Wang, Q. Wu, B. Qin, X. Chen, X. Huang, and Y. Zhou, Drive and Apple iCloud cloud storage services?", Alphr,
“Group-oriented Proofs of Storage,” Asiaccs, no. 1, pp. 73– 2017. [Online]. Available:
84, 2015. http://www.alphr.com/apple/1000326/how-secure-are-
dropbox-microsoft-onedrive-google-drive-and-apple-
[57] T. P. Thao and K. Omote, “ELAR: Extremely Lightweight
icloud-cloud-storage. [Accessed: 06- Apr- 2017].
Auditing and Repairing for Cloud Security,” ACM Int. [73] "Dropbox Encryption vs. Google Drive Encryption", Virtru,
Conf. Proceeding Ser., vol. 5, pp. 40–51, 2016. 2017. [Online]. Available:
[58] J. Xu, F. Zhou, Z. Jiang, and R. Xue, “Dynamic proofs of https://www.virtru.com/blog/dropbox-encryption/.
retrievability with square-root oblivious RAM,” J. Ambient [Accessed: 06- Apr- 2017].
Intell. Humaniz. Comput., vol. 7, no. 5, pp. 611–621, 2016. [74] "OneDrive Security: An Overview", Sookasa, 2017.
[59] D. Vasilopoulos, S. Antipolis, M. Önen, S. Antipolis, S. [Online]. Available:
https://www.sookasa.com/resources/onedrive-security/.
Antipolis, and S. Antipolis, “Message-Locked Proofs of
[Accessed: 06- Apr- 2017].
Retrievability with Secure Deduplication,” CCSW 2016 - [75] "Security Architecture - Security - Trust guide - Dropbox
Proc. 2016 ACM Cloud Comput. Secur. Work., pp. 73–83, Business", Dropbox, 2017. [Online]. Available:
2016. https://www.dropbox.com/business/trust/security/architect
[60] J. Lavauzelle and F. Levy-Dit-Vehel, “New proofs of ure. [Accessed: 06- Apr- 2017].
retrievability using locally decodable codes,” IEEE Int. [76] "Security - Google Cloud Help", Support.google.com,
Symp. Inf. Theory - Proc., vol. 2016–Augus, pp. 1809– 2017. [Online]. Available:
https://support.google.com/work/answer/6056693?hl=en.
1813, 2016.
[Accessed: 06- Apr- 2017].
[77] "Microsoft Trust Center | Encryption", Microsoft.com,
2017. [Online]. Available: https://www.microsoft.com/en-
13
us/trustcenter/security/encryption. [Accessed: 06- Apr- [94] D. Basile, "5 huge trends in big data and storage", The Next
2017]. Web, 2017. [Online]. Available:
[78] "What is USA Patriot Act? - Definition from WhatIs.com", https://thenextweb.com/insider/2016/04/01/5-big-data-
SearchDataManagement, 2017. [Online]. Available: storage-trends-watch/#.tnw_FA3yw6Rq. [Accessed: 08-
http://searchdatamanagement.techtarget.com/definition/Pa Apr- 2017].
triot-Act. [Accessed: 06- Apr- 2017]. [95] P. Dholakiya, "Five key cloud trends to look forward to in
[79] J. Gilbert, "USA Patriot Act Effect on Cloud Computing 2017: Containers, AI, and more", Cloud Tech News, 2017.
Services", ITLG, 2017. [Online]. Available: [Online]. Available: https://www.cloudcomputing-
https://www.itlawgroup.com/resources/articles/113-usa- news.net/news/2017/feb/03/five-key-cloud-trends-look-
patriot-act-effect-on-cloud-computing-services. [Accessed: forward-2017-containers-ai-and-more/. [Accessed: 08-
06- Apr- 2017]. Apr- 2017].
[80] M. Mozart, "Human Error Caused Microsoft Azure Outage [96] D. Raffo, "Hot data storage technology trends for 2017",
- Cloudwards", Cloudwards, 2017. [Online]. Available: SearchStorage, 2017. [Online]. Available:
https://www.cloudwards.net/news/human-error-caused- http://searchstorage.techtarget.com/feature/Hot-data-
microsoft-azure-outage-5776/. [Accessed: 06- Apr- 2017]. storage-technology-trends-for-2017. [Accessed: 08- Apr-
[81] M. Balneario and Bjelleklang, "Time to Get Real: 2017].
Amazon's AWS is Terrifying", Cloudwards, 2017. [Online]. [97] "What is cloud-to-cloud backup? - Definition from
Available: https://www.cloudwards.net/time-to-get-real- WhatIs.com", WhatIs.com, 2017. [Online]. Available:
amazons-aws-is-terrifying/. [Accessed: 06- Apr- 2017]. http://whatis.techtarget.com/definition/cloud-to-cloud-
[82] "Dropbox Explains Reason Behind 2014 Outage", backup. [Accessed: 08- Apr- 2017].
Cloudwards, 2017. [Online]. Available: [98] I. Orton, A. Alva, and B. Endicott-Popovsky, Legal Process
https://www.cloudwards.net/news/dropbox-explains- and Requirements for Cloud Forensic Investigations. 2013.
reason-behind-2014-outage-2534/. [Accessed: 06- Apr- [99] K. Thomas, “Microsoft Cloud Data Breach Heralds Things
2017]. to Come,” PCWorld, 2010. [Online]. Available:
[83] J. M, C. A, and K. S, “Survey On Verification Of Storage https://www.pcworld.com/article/214775/microsoft_cloud
Correctness In Cloud Computing,” Int. J. Eng. Comput. _data_breach_sign_of_future.html. [Accessed: 20-Dec-
Sci., vol. 4, no. 9, pp. 14336–14340, 2015. 2017].
[84] "Data Deduplication - EMC Glossary", Emc.com, 2017. [100] D. Robb, “Top 10 AI and Machine Learning Data
[Online]. Available: Storage Trends,” Enteprise Storage Focum.com, 2017.
https://www.emc.com/corporate/glossary/data- [Online]. Available:
deduplication.htm. [Accessed: 07- Apr- 2017]. http://www.enterprisestorageforum.com/storage-
[85] "Cloud encryption - client-side vs server-side", management/top-10-ai-and-machine-learning-data-
Stackfield.com, 2017. [Online]. Available: storage-trends.html. [Accessed: 21-Dec-2017].
https://www.stackfield.com/blog/cloud-encryption---
client-side-vs-server-side-1. [Accessed: 07- Apr- 2017].
[86] ]D. Quick, B. Martini and K. Choo, Cloud Storage
Forensics, 1st ed. Syngress, 2013, p. 143.
[87] Y. Elkhatib, “Defining Cross-Cloud Systems,” pp. 1–4,
2016.
[88] W. Dou, X. Zhang, J. Liu and J. Chen, "HireSome-II:
Towards Privacy-Aware Cross-Cloud Service Composition
for Big Data Applications", IEEE Transactions on Parallel
and Distributed Systems, vol. 26, no. 2, pp. 455-466, 2015.
[89] "What is software-defined networking (SDN)? - Definition
from WhatIs.com", SearchSDN, 2017. [Online]. Available:
http://searchsdn.techtarget.com/definition/software-
defined-networking-SDN. [Accessed: 08- Apr- 2017].
[90] A. Greenberg, SDN for the Cloud, 1st ed. Microsoft, 2015,
pp. 1-47.
[91] D. Raffo, "Hot data storage technology trends for 2017",
SearchStorage, 2017. [Online]. Available:
http://searchstorage.techtarget.com/feature/Hot-data-
storage-technology-trends-for-2017. [Accessed: 08- Apr-
2017].
[92] R. Kennedy, "Hybrid cloud storage: Past, present and
future", Cloud computing news, 2017. [Online]. Available:
https://www.ibm.com/blogs/cloud-
computing/2016/08/hybrid-cloud-storage-past-present-
future/. [Accessed: 08- Apr- 2017].
[93] J. Chen, "The Evolution of Computing: AlphaGo",
Computing in Science & Engineering, vol. 18, no. 4, pp. 4-
7, 2016.
14