2015
DOI: 10.5120/21674-4762
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Data Integrity Techniques in Cloud Computing

Abstract: Cloud computing which is envisioned as the next generation architecture of IT Enterprise comes into focus when someone thinks about what IT always needs. It is way to increase capacity or add capabilities without investing in infrastructure as well as licensing cost on new software. Besides of this advantage there is one major problem that needs to face while keeping sensitive data in cloud, Assurance of data integrity that is data remain as it is on server for long time. Client cannot physically access the da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…Data Integrity is very important among the other Cloud challenges. As data integrity gives the guarantee that data is of high quality, correct, unmodified [17].…”
Section: Data Intergrity Checkmentioning
confidence: 99%
See 1 more Smart Citation
“…Data Integrity is very important among the other Cloud challenges. As data integrity gives the guarantee that data is of high quality, correct, unmodified [17].…”
Section: Data Intergrity Checkmentioning
confidence: 99%
“…It Keeps only the computed MACs on his local storage, then sends the fragments of the file to the CSP, and deletes the local copy of the fragments. Whenever a customer needs to check the Data integrity of file F,the TTP sends a request to retrieve the file from CSP, reveals a secret keys to the CSP and asks to recompute the MACs of the fragments of the file, and compares the re-computed MACs with the previously stored values [17]. If the re-computed MACs at Cloud Provider and the MACs stored in the TTP are the same, then the data integrity is checked.…”
Section: Data Intergrity Checkmentioning
confidence: 99%
“…It can check the data in the storage without retrieving it. The principal behind PDP involves in 2 stages [4]. Setup Stage:…”
Section: Provable Data Possession (Pdp)mentioning
confidence: 99%
“…The infor-mation proprietor registers a Message Authentication Code (MAC) of the entire record with an arrangement of mystery keys and stores them locally before outsourcing it to CSP. It keeps just the registered MAC on this nearby stockpiling, sends the record to the CSP, and erases the neighborhood duplicate of the document F. At whatever point a examiner needs to check the Data respectability of record F, Person sends a demand to recover the document from CSP, uncovers a mystery key to the cloud server and solicits from the entire record, and contrasts the re-figured and the beforehand put away esteem [4]. Limitations:…”
Section: Pdp Based On Macmentioning
confidence: 99%
See 1 more Smart Citation