Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage

被引:0
作者
Srivastav, Niharika [1 ]
Mathew, Rejo [1 ]
机构
[1] NMIMS Deemed Be Univ, Mukesh Patel Sch Technol Management & Engn, Dept IT, Mumbai, Maharashtra, India
来源
PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018) | 2020年 / 31卷
关键词
Cloud computing; Storage; Data integrity and confidentiality; Metadata; Hash function; Mobile Cloud Computing (MCC);
D O I
10.1007/978-3-030-24643-3_62
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper reviews few approaches on securely storing data in the cloud storage. Most of the cloud computing models aim towards ensuring that the data confidentiality and integrity prevails although users of the cloud use internet for using the services provided by the cloud computing system. The first mechanism considered involves checking that data integrity has been preserved or not through use of hash-function and metadata approach. The second mechanism involves making use of SHA-3 hash function to provide confidentiality as well as integrity for the data stored in cloud storage through use of the Mobile Cloud Computing (MCC) services.
引用
收藏
页码:522 / 528
页数:7
相关论文
共 50 条
  • [21] Improvement of Data Integrity and Data Dynamics for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Tidke, Bharat
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 279 - 289
  • [22] How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective
    Wu, Zongda
    Xuan, Shaolong
    Xie, Jian
    Lin, Chongze
    Lu, Chenglang
    COMPUTERS IN BIOLOGY AND MEDICINE, 2022, 147
  • [23] Provisioning an efficient data deduplication model for cloud storage and integrity
    Kumar, Doddi Suresh
    Srinivasu, Nulaka
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024,
  • [24] Data Integrity and Availability Verification Game in Untrusted Cloud Storage
    Djebaili, Brahim
    Kiennert, Christophe
    Leneutre, Jean
    Chen, Lin
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 287 - 306
  • [25] A New Mechanism to Ensure Integrity for MapReduce in Cloud Computing
    Bendahmane, Ahmed
    Essaaidi, Mohammad
    el Moussaoui, Ahmed
    Younes, Ali
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 785 - 790
  • [26] Certificateless batch verification protocol to ensure data integrity in multi-cloud using lattices
    Sasikala, Chinthakunta
    Bindu, Chigarapalle Shoba
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2019, 12 (04) : 236 - 242
  • [27] Integrity as a service for replicated data on the cloud
    Abo-alian, Alshaimaa
    Badr, Nagwa L.
    Tolba, M. F.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (04)
  • [28] An Approach to Selecting Cloud Services for Data Storage in Heterogneous-multi-cloud Environment with High Availability and Confidentiality
    Kajiura, Yuuki
    Ueno, Shohei
    Kanai, Atsushi
    Tanimoto, Shigeaki
    Sato, Hiroyuki
    2015 IEEE 12TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS ISADS 2015, 2015, : 205 - 210
  • [29] A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System
    Huang, Pei
    Fan, Kai
    Yang, Hanzhe
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    IEEE ACCESS, 2020, 8 (94780-94794) : 94780 - 94794
  • [30] Enabling Data Integrity Check and Corruption Prevention in Thin Cloud Storage
    Kamaladheepan, N.
    Marimuthu, A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (03): : 84 - 87