Techniques of providing data integrity in cloud computing

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The Data Integrity is simply termed as no corruption in the data that can be assured with consistency and accuracy over the time Precisely it can be defined as the data should be recorded as the Original and at the time of retrieval it should ensure that it send the Original recorded data. Data Integrity is the fundamental component of Information Security. Every technique of data integrity ensures the no loss in flow of data. We start with briefing about Data Integrity and Cloud Computing and then briefing Data Integrity models. After this, we examine General strategies that guarantee information uprightness, Challenges in Cloud Computing, Techniques in cloud to guarantee information honesty to be specific provable information ownership and verification of retrievability and their disadvantages and their confinements over some particular cases. This paper is Standardized investigation of existing system for the guaranteeing the information trustworthiness in cloud and another strategy is proposed. This paper is Standardized analysis of existing mechanism for the ensuring the data integrity in cloud and a new method is proposed.


  • Keywords


    Data Integrity; Retrievability; Computing; Trustworthiness.

  • References


      [1] M. Armbrust A Fox, R. Griffith, A. Joseph, R. Katz, A. Kon-winski,G . Lee, D. Patterson, A. Rabkin, I. Stoica, et al., “Above the clouds: ABerkeley view of cloud computing,” University of California, Berkeley, Tech. Rep, 2009

      [2] Chandran S. and Angepat M., “Cloud Computing: Analyzing the risks involved in cloud computing environments,” in Proceed-ings of Natural Sciences and Engineering, Sweden, 2010.

      [3] Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou “Security and Privacy in Cloud Computing: A Survey” in 2010 Sixth International Conference on Semantics, Knowledge and Grids. https://doi.org/10.1109/SKG.2010.19.

      [4] Mahesh S.Giri, Bhupesh Gaur, Deepak Tomar “A Survey on Data Integrity Techniques in Cloud Computing” in International Journal of Computer Applications.

      [5] Sravan Goud Utkam,David Raju Kuppala, Amudhavel J, Raviteja Parasa,” A Secured Symmetric Key Enccryption Technique Using Images as Secret Keys” International Journal of Pure and Applied Mathematics, Volume 116 No. 6 2017, 149-153.


 

View

Download

Article ID: 9471
 
DOI: 10.14419/ijet.v7i1.1.9471




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.