A Metadata Verification Scheme for Data Auditing in Cloud Environment

@inproceedings{Ramane2012AMV,
  title={A Metadata Verification Scheme for Data Auditing in Cloud Environment},
  author={Muralikrishnan Ramane and Bharath Elangovan},
  booktitle={CloudCom 2012},
  year={2012}
}
Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platformservices online. The notion on verifying data for intactness is termed as data auditing and the process is carried out by the client or by a third party auditor delegated by the client. The delegation model… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 16 REFERENCES

A classification of distinct vulnerabilities in cloud computing

Paresh D Sharma
  • World Journal of Science and Technology, Vol. 2, 2012.
  • 2012
VIEW 1 EXCERPT

Cloud Computing Security, International Journal of Ambient Computing and Intelligence

C Sean, C Kevin
  • Vol. 3, pp.38-46, April-June 2011, IGI Publishing.
  • 2011
VIEW 3 EXCERPTS

Security and trust in Cloud scenarios

  • 2011 1st International Workshop on Securing Services on the Cloud (IWSSC)
  • 2011
VIEW 1 EXCERPT