2014
DOI: 10.1007/978-3-319-03692-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Data Integrity Verification in Hybrid Cloud Using TTPA

Abstract: Cloud computing is a growing technology in the field of IT enterprises that provides storage, compute and network resources as a service over the internet. It allows the user to move their application software and large databases to the data centres offered by multiple cloud service providers. Hence trusted enforcement of data and services out sourced on to cloud is a big challenging issue. In this paper we focus on the auditing mechanism in hybrid cloud using trusted Third Party Auditor (TTPA). Hybrid cloud i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 5 publications
(16 reference statements)
0
3
0
Order By: Relevance
“…The deployment setup of data integrity strategy is dependent on the environment of the proposed system. Clients can store their data in public cloud set up [98], multi-cloud setup [99,100] or hybrid cloud set up [101]. If data are placed in a public cloud setup, clients lose access control visibility on data due to the outsider data management policy of CSP.…”
Section: Classification Of Data Integrity Strategymentioning
confidence: 99%
“…The deployment setup of data integrity strategy is dependent on the environment of the proposed system. Clients can store their data in public cloud set up [98], multi-cloud setup [99,100] or hybrid cloud set up [101]. If data are placed in a public cloud setup, clients lose access control visibility on data due to the outsider data management policy of CSP.…”
Section: Classification Of Data Integrity Strategymentioning
confidence: 99%
“…Several schemes and auditing protocols have been introduced for protecting the integrity of outsourced data [8][9][10][11][12][13][14][15][16][17]. Two schemes PDP [8] and POR [9] were introduced initially to cross check the integrity of outsourced data.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et.al [14][15][16] focuses on privacy preserving, which is an important property during the verification process. An adversary alters the cloud data arbitrarily and is able to provide a strong and valid proof in order to pass the verification process.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation