Abstract
Introduction: Cloud has gained a huge number of consumers in today's environment due to its broad range of services. On the cloud server, data owners can store any type of data, and users can access it whenever they need it.
Methods: Numerous challenges come with the ease of use of outsourced data. The accuracy and secrecy of data outsourced come at stake. Users have a low level of trust in cloud service providers since they can be deceptive at times. A cloud audit is an examination conducted by a data owner to assess and document the performance of their cloud vendor.
Results: The goal of a cloud vendor audit is to determine how well they follow a set of predetermined controls.
Conclusion: In the article, the authors present various schemes of cloud auditing, their categorizations, and merits and demerits along with the future directions of research in the domain.
Graphical Abstract
[http://dx.doi.org/10.1109/TPDS.2012.337]
[http://dx.doi.org/10.3233/JCS-130489]
[http://dx.doi.org/10.1145/1952982.1952994]
[http://dx.doi.org/10.1109/MCC.2016.94]
[http://dx.doi.org/10.1109/TIFS.2016.2631951]
[http://dx.doi.org/10.1016/j.procs.2016.06.024]
[http://dx.doi.org/10.1016/j.future.2014.08.007]
[http://dx.doi.org/10.1109/TCC.2014.2299807]
[http://dx.doi.org/10.1007/978-3-030-36987-3_24]
b) W. Ding, Z. Yan, and R. Deng, "Privacy-preserving data processing with flexible access control", IEEE Trans. Depend. Secure Comput., no. Dec, pp. 1-1, 2017.
[http://dx.doi.org/10.1016/j.ins.2017.05.004]
[http://dx.doi.org/10.1109/TKDE.2007.190647]
[http://dx.doi.org/10.1007/978-3-642-10366-7_19]
[http://dx.doi.org/10.1109/INFCOM.2010.5462173]
[http://dx.doi.org/10.1109/TC.2011.245]
[http://dx.doi.org/10.4304/jnw.6.7.1033-1040]
[http://dx.doi.org/10.1007/978-3-319-19962-7_23]
[http://dx.doi.org/10.1109/TSC.2012.35]
[http://dx.doi.org/10.1049/iet-ifs.2012.0271]
[http://dx.doi.org/10.1109/TIFS.2016.2520886]
[http://dx.doi.org/10.1007/s11042-015-3139-7]
[http://dx.doi.org/10.1109/TIFS.2015.2423264]
[http://dx.doi.org/10.1016/j.ins.2015.12.043]
[http://dx.doi.org/10.1016/j.ins.2016.09.049]
[http://dx.doi.org/10.1109/TDSC.2017.2662216]
[http://dx.doi.org/10.1109/TPDS.2013.191]
[http://dx.doi.org/10.1109/TC.2015.2389955]
[http://dx.doi.org/10.1109/TIFS.2017.2705620]
[http://dx.doi.org/10.19101/IJACR.2018.837010]
[http://dx.doi.org/10.1007/s11227-015-1598-2]
[http://dx.doi.org/10.1007/978-3-642-00457-5_8]
[http://dx.doi.org/10.1109/INCoS.2013.185]
[http://dx.doi.org/10.1109/TCC.2014.2366148]
[http://dx.doi.org/10.1007/s00145-015-9216-2]
[http://dx.doi.org/10.1145/2484402.2484408]
[http://dx.doi.org/10.1109/INFOCOM.2014.6848154]
[http://dx.doi.org/10.1145/2660267.2660310]
[http://dx.doi.org/10.1145/3052973.3052997]
[http://dx.doi.org/10.1109/ICCUBEA.2018.8697842]
[http://dx.doi.org/10.1109/ICDCS.2008.68]
[http://dx.doi.org/10.1145/1866307.1866421]
[http://dx.doi.org/10.1109/TPDS.2012.66]
[http://dx.doi.org/10.1016/j.jcss.2011.12.018]
[http://dx.doi.org/10.1007/978-3-642-38980-1_1]
[http://dx.doi.org/10.1109/TSC.2014.1]
[http://dx.doi.org/10.4018/IJDCF.2019010110]
[http://dx.doi.org/10.1109/TBDATA.2017.2701352]
[http://dx.doi.org/10.1109/TBDATA.2016.2587659]
[http://dx.doi.org/10.1109/CNS.2013.6682702]
[http://dx.doi.org/10.1007/978-3-030-00012-7_31]
[http://dx.doi.org/10.1007/s11431-017-9258-0]
[http://dx.doi.org/10.1109/ICoAC.2017.7951739]
[http://dx.doi.org/10.1109/IC3.2018.00031]
[http://dx.doi.org/10.1016/j.jnca.2018.08.003]
[http://dx.doi.org/10.1145/2018436.2018462]
[http://dx.doi.org/10.1109/Allerton.2011.6120248]
[http://dx.doi.org/10.1016/j.csi.2011.05.007]
[http://dx.doi.org/10.1016/j.ins.2018.06.018]
[http://dx.doi.org/10.1016/j.future.2016.12.016]
[http://dx.doi.org/10.1109/TDSC.2021.3102099]
[http://dx.doi.org/10.1109/TDSC.2019.2910058]
[http://dx.doi.org/10.1016/j.csi.2022.103628]
[http://dx.doi.org/10.1145/2484313.2484339]
[http://dx.doi.org/10.1007/978-3-319-39077-2_5]
[http://dx.doi.org/10.1109/TBDATA.2020.3029209]
[http://dx.doi.org/10.1016/j.jpdc.2021.09.006]
(b) A.K. Dwivedi, N. Kumar, and M.L. Das, "On Accountable and Distributed Audit of Outsourced Data", In: A.K. Nagar, D. Singh Jat, D.K. Mishra, A. Joshi, Eds., Intelligent Sustainable Systems. Lecture Notes in Networks and Systems., vol. 578. Springer: Singapore, 2023.
[http://dx.doi.org/10.1007/978-981-19-7660-5_60]
[http://dx.doi.org/10.1109/TIFS.2016.2615853]
[http://dx.doi.org/10.1109/MWC.2017.1800116]
[http://dx.doi.org/10.1155/2021/9921209]
[http://dx.doi.org/10.1109/ACCESS.2018.2888940]
[http://dx.doi.org/10.1016/j.ins.2020.01.051]
[http://dx.doi.org/10.1016/j.jpdc.2020.06.007]
[http://dx.doi.org/10.1016/j.ipm.2020.102382]
[http://dx.doi.org/10.1016/j.future.2019.10.014]
[http://dx.doi.org/10.1109/TCC.2019.2908400]
[http://dx.doi.org/10.1109/ACCESS.2019.2952635]