2011 IEEE Conference on Open Systems 2011
DOI: 10.1109/icos.2011.6079311
|View full text |Cite
|
Sign up to set email alerts
|

CloudZone: Towards an integrity layer of cloud data storage based on multi agent system architecture

Abstract: The computing power in a cloud computing environments is supplied by a collection of data centers, or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. Data integrity checking of data and data structures has grown in importance recently in cloud computing due to the expansion of online cloud services, which have become reliable and scalable. In this paper we propose an integrity layere… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…It uses error correction code in order to check that the data is correct or not. Talib et al [8] proposed layer architecture based on MAS architecture having two main layers: (a) cloud resource layer [cloud server side] (b) MAS architecture layer [cloud client side]. The MAS architecture has two agents namely Cloud service provider agent [CSPA] and Cloud data integrity backup agent [CDIBA].…”
Section: Literature Reviewmentioning
confidence: 99%
“…It uses error correction code in order to check that the data is correct or not. Talib et al [8] proposed layer architecture based on MAS architecture having two main layers: (a) cloud resource layer [cloud server side] (b) MAS architecture layer [cloud client side]. The MAS architecture has two agents namely Cloud service provider agent [CSPA] and Cloud data integrity backup agent [CDIBA].…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, not every mobile device is equipped with a USIM chip. In addition, there are a few security threats associated with USIM based authentication [3]. The other prior researches include smart card based authentication with user ID ans password [4], OpenID based authentication that requires to memorize passwords [5] etc.…”
Section: Introductionmentioning
confidence: 99%
“…The survey found that 58 percent of the general population and 86 percent of senior business leaders are excited about the potential of cloud computing, more than 90 percent of these same people are concerned about the security, and privacy of their own data in the cloud. There is a probability where a malicious user can invade the cloud by impersonating a genuine user, there by infecting the entire cloud thus troubling many customers who are sharing the contaminated cloud [2] [7]. Data integrity is one of the main security problem which is faced by cloud computing.…”
Section: Introductionmentioning
confidence: 99%