Corpus ID: 7005053

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

@inproceedings{Attas2011EfficientIC,
  title={Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing},
  author={Dalia Attas and Omar Batrafi},
  year={2011}
}
It has been widely observed that the concept of cloud computing is become one of major theory in the world of IT industry. It involves storing the user's data to be able to use the applications and services that the clouds introduce. There is a significant numbers of risks can be occurred. One of these risks that can attack the cloud computing is the integrity of the data stored in the cloud (2). In order to overcome the threat of integrity of the data, the user must be able to use the… Expand
Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing
TLDR
The basics of cloud computing, general model and different approaches used for TPA are highlighted, which help the user to evaluate the risk of their services. Expand
Identifying Data Integrity in the Cloud Storage
TLDR
The aim of this research is ensuring the integrity of the data and providing the proof that data is in secured manner and providing Cryptographic key to secure the data in the cloud. Expand
Verify Correctness of Trusted data in Clouds
TLDR
By using metadata of the files, this paper can verify the data that is stored by a user at remote storage in the cloud is not modified by the archive and Third party verifier, and there may be a chance to reduce the number of cryptographic operations. Expand
Verifying Correctness of Trusted data in Clouds
TLDR
By using metadata of the files, this paper can verify the data that is stored by a user at remote storage in the cloud is not modified by the archive and Third party verifier, and there may be a chance to reduce the number of cryptographic operations. Expand
A Comprehensive Survey on Data Integrity Proving Schemes in Cloud Storage
TLDR
The basics of cloud storage, working of cloudstorage system, various concepts related to data integrity like overview of data integrity, physical vs. logical integrity, types of integrity constraints and survey on basic data integrity proving schemes are focused on. Expand
Framework to Improve Data Integrity in Multi Cloud Environment
TLDR
A framework that would provide integrity of data of multiple users through Third Party Auditor (TPA) is proposed and various algorithms to implement this framework are proposed to provide best cost optimization for various requirements of user. Expand
Cloud Server Storage Security Using TPA
TLDR
This project proposes a method that, owner need not download the data or files to check the integrity and it provides the proofs that data stored at a remote storage in cloud is not modified by anyone and there by integrity of the data is assured. Expand
Auditability and Privacy preserving in Cloud Storage
25 Abstract: Cloud computing is a revolutionary new approach to how computing services are produced and consumed. It is a concept of sharing resources and giving them as essential resources. UsingExpand
Integrity checking for cloud environment using encryption algorithm
TLDR
The proposed work draws a conceptual cloud architecture by adopting an encryption algorithm with dynamic small size key to ensure the security and doesn't compromise any information with the cloud server. Expand
TPA BASED CLOUD STORAGE SECURITY TECHNIQUES
TLDR
In this paper, an enhanced method for securing the TPA by using Keyed Hash Message Authentication Code (HMAC) is proposed. Expand
...
1
2
3
...

References

SHOWING 1-7 OF 7 REFERENCES
Provable data possession at untrusted stores
TLDR
The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs and the overhead at the server is low (or even constant), as opposed to linear in the size of the data. Expand
Cloud Computing : Analysing the risks involved in cloud computing environments
In recent years, cloud computing has been an emerging computing model in the IT industry. Machines involved in cloud computing deliver services in a scalable manner. It provides efficient computingExpand
Network security - private communication in a public world
TLDR
Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Expand
Auditing to Keep Online Storage Services Honest
TLDR
It is argued that third-party auditing is important in creating an online service-oriented economy, because it allows customers to evaluate risks, and it increases the efficiency of insurance-based risk mitigation. Expand
The NIST Definition of Cloud Computing
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) thatExpand
Security in Computing, 2 nd ed
  • 1997
Security in Computing, 2 ed
  • 1997