The International Journal of Innovative Research in Computer and Communication Engineering
In this paper, the authors proposed a key generation and third party audit algorithm for verifying the integrity of untrusted and outsourced storage in cloud. Their audit service is developed according to these techniques, splitting and merging, random sampling, dynamic auditing, and index hash table, supporting provable updates to outsourced data and timely anomaly detection. In addition to that they proposed a method based on periodic verification for improving the audit service performance. Their experimental results not only validating the effectiveness approaches, but also show their audit system verifies the integrity with lower computation overhead and also requiring less storage for audit meta data.