A SURVEY ON PRIVACY PRESERVING PUBLIC AUDITING TECHNIQUES FOR SHARED DATA IN THE CLOUD ENVIRONMENT
Cloud computing allows cloud users to store huge amount of data. This helps organizations in minimizing the burden of investment on resources and their maintenance. To keep data secure, the cloud service provider (CSP) stores data replicas on geographically distributed servers, and maintains reliability and availability. As owners’ data is stored in distributed servers, they want assurance of preservation of their data. There are several computational techniques to check the data intactness of data. But, if a client performs computation to check the data on his own system or any personal hardware, the problem in these approaches is in monitoring which can lead to less security and may be costly. Therefore, third party auditing (TPA) has been introduced which provides authorization to the client, integrity of data and supports dynamic data by preserving the cloud user’s identity without retrieving the whole file, by different methodologies. Besides all these, decreases computing cost on the user’s side, protects from malicious act and increases trust on cloud storage. This paper surveys numerous privacy preserving techniques in the cloud environment.