Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage

被引:0
|
作者
Srivastav, Niharika [1 ]
Mathew, Rejo [1 ]
机构
[1] NMIMS Deemed Be Univ, Mukesh Patel Sch Technol Management & Engn, Dept IT, Mumbai, Maharashtra, India
来源
PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018) | 2020年 / 31卷
关键词
Cloud computing; Storage; Data integrity and confidentiality; Metadata; Hash function; Mobile Cloud Computing (MCC);
D O I
10.1007/978-3-030-24643-3_62
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper reviews few approaches on securely storing data in the cloud storage. Most of the cloud computing models aim towards ensuring that the data confidentiality and integrity prevails although users of the cloud use internet for using the services provided by the cloud computing system. The first mechanism considered involves checking that data integrity has been preserved or not through use of hash-function and metadata approach. The second mechanism involves making use of SHA-3 hash function to provide confidentiality as well as integrity for the data stored in cloud storage through use of the Mobile Cloud Computing (MCC) services.
引用
收藏
页码:522 / 528
页数:7
相关论文
共 50 条
  • [1] A NEURAL DATA SECURITY MODEL: ENSURE HIGH CONFIDENTIALITY AND SECURITY IN CLOUD DATA STORAGE ENVIRONMENT
    Jegadeeswari, S.
    Dinadayalan, P.
    Gnanambigai, N.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 400 - 406
  • [2] Towards Data Confidentiality and Portability in Cloud Storage
    Alomari, Ebtesam Ahmad
    Monowar, Muhammad Mostafa
    DESIGN, USER EXPERIENCE, AND USABILITY: USER EXPERIENCE DESIGN FOR DIVERSE INTERACTION PLATFORMS AND ENVIRONMENTS, PT II, 2014, 8518 : 38 - 49
  • [3] The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing
    Rukavitsyn, Andrey N.
    Borisenko, Konstantin A.
    Holod, Ivan I.
    Shorov, Andrey V.
    PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 272 - 274
  • [4] Data Integrity and Data Dynamics with Secure Storage Service in Cloud
    Nithiavathy, R.
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [5] A Framework to Ensure Data Storage Security in Cloud Computing
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [6] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    K. L. Neela
    V. Kavitha
    Cluster Computing, 2018, 21 : 115 - 124
  • [7] Data Confidentiality and Integrity Verification using User Authenticator scheme in cloud
    Nirmala, V.
    Sivanandhan, R. K.
    Lakshmi, R. Shanmuga
    2013 IEEE INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC), 2013,
  • [8] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    Neela, K. L.
    Kavitha, V.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 115 - 124
  • [9] Shamir's Key Based Confidentiality on Cloud Data Storage
    Durai, Kamalraj
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (01) : 48 - 53
  • [10] A Mobile Cloud Middleware for Data Storage and Integrity
    Akherfi, Khadija
    Harroud, Hamid
    Gerndt, Michael
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 231 - 237