• Corpus ID: 7005053

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

@inproceedings{Attas2011EfficientIC,
  title={Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing},
  author={Dalia Attas and Omar Batrafi},
  year={2011}
}
It has been widely observed that the concept of cloud computing is become one of major theory in the world of IT industry. It involves storing the user's data to be able to use the applications and services that the clouds introduce. There is a significant numbers of risks can be occurred. One of these risks that can attack the cloud computing is the integrity of the data stored in the cloud (2). In order to overcome the threat of integrity of the data, the user must be able to use the… 

Figures from this paper

Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing

TLDR
The basics of cloud computing, general model and different approaches used for TPA are highlighted, which help the user to evaluate the risk of their services.

DATA INTEGRITY CHECKING FOR SECURING CLOUD STORAGE USING MODIFIED BLOWFISH ALGORITHM

TLDR
New public and private auditability schemes which are used by TPA to audit the remotely stored data in the cloud are elaborates and comparative analysis of existing integrity check techniques with the new technique for cloud data storage is provided.

DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE

TLDR
The scheme only provides the information about the change in data it does not keep data intact or secure from modification over cloud, but TPA is a Third Party Auditor who verifies the files stored over the cloud if they are modified or not.

Identifying Data Integrity in the Cloud Storage

TLDR
The aim of this research is ensuring the integrity of the data and providing the proof that data is in secured manner and providing Cryptographic key to secure the data in the cloud.

Meta Data Based Data Integrity Tracking Scheme in Cloud Environment

  • N. Patil
  • Computer Science
    International Journal for Research in Applied Science and Engineering Technology
  • 2019
TLDR
This paper proposed a scheme which is less complex and can give better results than existing schemes which had already been proposed and studied different schemes and found that there is scope of improvement in existing schemes.

Verify Correctness of Trusted data in Clouds

TLDR
By using metadata of the files, this paper can verify the data that is stored by a user at remote storage in the cloud is not modified by the archive and Third party verifier, and there may be a chance to reduce the number of cryptographic operations.

Verifying Correctness of Trusted data in Clouds

TLDR
By using metadata of the files, this paper can verify the data that is stored by a user at remote storage in the cloud is not modified by the archive and Third party verifier, and there may be a chance to reduce the number of cryptographic operations.

A Comprehensive Survey on Data Integrity Proving Schemes in Cloud Storage

TLDR
The basics of cloud storage, working of cloudstorage system, various concepts related to data integrity like overview of data integrity, physical vs. logical integrity, types of integrity constraints and survey on basic data integrity proving schemes are focused on.

Framework to Improve Data Integrity in Multi Cloud Environment

TLDR
A framework that would provide integrity of data of multiple users through Third Party Auditor (TPA) is proposed and various algorithms to implement this framework are proposed to provide best cost optimization for various requirements of user.

Cloud Server Storage Security Using TPA

TLDR
This project proposes a method that, owner need not download the data or files to check the integrity and it provides the proofs that data stored at a remote storage in cloud is not modified by anyone and there by integrity of the data is assured.

References

SHOWING 1-7 OF 7 REFERENCES

Cloud Computing : Analysing the risks involved in cloud computing environments

TLDR
A study about the risk issues involved in cloud computing highlights the different types of risks and how their existence can affect the cloud users and lays out measures to be taken while using cloud computing to reduce negative effects on the outcome and maintain data integrity.

Network security - private communication in a public world

TLDR
Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards.

The NIST Definition of Cloud Computing

TLDR
This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.

Auditing to Keep Online Storage Services Honest

TLDR
It is argued that third-party auditing is important in creating an online service-oriented economy, because it allows customers to evaluate risks, and it increases the efficiency of insurance-based risk mitigation.

Provable data possession at untrusted stores

TLDR
The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs and the overhead at the server is low (or even constant), as opposed to linear in the size of the data.

Security in Computing, 2 nd ed

  • 1997

Security in Computing, 2 ed

  • 1997