• Corpus ID: 7005053

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

  title={Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing},
  author={Dalia Attas and Omar Batrafi},
It has been widely observed that the concept of cloud computing is become one of major theory in the world of IT industry. It involves storing the user's data to be able to use the applications and services that the clouds introduce. There is a significant numbers of risks can be occurred. One of these risks that can attack the cloud computing is the integrity of the data stored in the cloud (2). In order to overcome the threat of integrity of the data, the user must be able to use the… 

Figures from this paper

Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing
The basics of cloud computing, general model and different approaches used for TPA are highlighted, which help the user to evaluate the risk of their services.
New public and private auditability schemes which are used by TPA to audit the remotely stored data in the cloud are elaborates and comparative analysis of existing integrity check techniques with the new technique for cloud data storage is provided.
The scheme only provides the information about the change in data it does not keep data intact or secure from modification over cloud, but TPA is a Third Party Auditor who verifies the files stored over the cloud if they are modified or not.
Identifying Data Integrity in the Cloud Storage
The aim of this research is ensuring the integrity of the data and providing the proof that data is in secured manner and providing Cryptographic key to secure the data in the cloud.
Meta Data Based Data Integrity Tracking Scheme in Cloud Environment
  • N. Patil
  • Computer Science
    International Journal for Research in Applied Science and Engineering Technology
  • 2019
This paper proposed a scheme which is less complex and can give better results than existing schemes which had already been proposed and studied different schemes and found that there is scope of improvement in existing schemes.
A Comprehensive Survey on Data Integrity Proving Schemes in Cloud Storage
The basics of cloud storage, working of cloudstorage system, various concepts related to data integrity like overview of data integrity, physical vs. logical integrity, types of integrity constraints and survey on basic data integrity proving schemes are focused on.
Framework to Improve Data Integrity in Multi Cloud Environment
A framework that would provide integrity of data of multiple users through Third Party Auditor (TPA) is proposed and various algorithms to implement this framework are proposed to provide best cost optimization for various requirements of user.
Cloud Server Storage Security Using TPA
This project proposes a method that, owner need not download the data or files to check the integrity and it provides the proofs that data stored at a remote storage in cloud is not modified by anyone and there by integrity of the data is assured.
Auditability and Privacy preserving in Cloud Storage
This paper studies the problems of ensuring data storage correctness and proposes an effective and secure scheme to address these issues and a third party auditor (TPA) is introduced securely.
Integrity checking for cloud environment using encryption algorithm
The proposed work draws a conceptual cloud architecture by adopting an encryption algorithm with dynamic small size key to ensure the security and doesn't compromise any information with the cloud server.


Provable data possession at untrusted stores
The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs and the overhead at the server is low (or even constant), as opposed to linear in the size of the data.
Cloud Computing : Analysing the risks involved in cloud computing environments
A study about the risk issues involved in cloud computing highlights the different types of risks and how their existence can affect the cloud users and lays out measures to be taken while using cloud computing to reduce negative effects on the outcome and maintain data integrity.
Network security - private communication in a public world
Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards.
Auditing to Keep Online Storage Services Honest
It is argued that third-party auditing is important in creating an online service-oriented economy, because it allows customers to evaluate risks, and it increases the efficiency of insurance-based risk mitigation.
The NIST Definition of Cloud Computing
This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Security in Computing, 2 nd ed
  • 1997
Security in Computing, 2 ed
  • 1997