2022
DOI: 10.55248/gengpi.2022.3.2.8
|View full text |Cite
|
Sign up to set email alerts
|

Data Integrity Attacks in Cloud Computing: A Review of Identifying and Protecting Techniques

Abstract: Cloud computing is growing tremendously in recent years. Many organizations are switching their traditional computing model to a cloud based because of its low cost and pay-as-you-go manner. Although Cloud Service Provider (CSP) ensures that the data stored in their remote cloud server will be intact and secure. But there are many data integrity issues exist that needed to be addressed. In Cloud environment, lack of data integrity is a major concern. In this paper, we have surveyed several past studies which i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 21 publications
(41 reference statements)
0
1
0
Order By: Relevance
“…Securing communication networks, safeguarding data and applications and ensuring the privacy and integrity of cloudbased services are some of the challenges involved in cybersecurity for cloud computing. The changing nature of cloud environments shared responsibility models, and the potential for access or data breaches pose significant risks (Kaja et al, 2022). To tackle these challenges effectively, various measures and best practices have been suggested in the field of cybersecurity.…”
Section: Technical Challengesmentioning
confidence: 99%
“…Securing communication networks, safeguarding data and applications and ensuring the privacy and integrity of cloudbased services are some of the challenges involved in cybersecurity for cloud computing. The changing nature of cloud environments shared responsibility models, and the potential for access or data breaches pose significant risks (Kaja et al, 2022). To tackle these challenges effectively, various measures and best practices have been suggested in the field of cybersecurity.…”
Section: Technical Challengesmentioning
confidence: 99%