Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage

被引:0
作者
Srivastav, Niharika [1 ]
Mathew, Rejo [1 ]
机构
[1] NMIMS Deemed Be Univ, Mukesh Patel Sch Technol Management & Engn, Dept IT, Mumbai, Maharashtra, India
来源
PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018) | 2020年 / 31卷
关键词
Cloud computing; Storage; Data integrity and confidentiality; Metadata; Hash function; Mobile Cloud Computing (MCC);
D O I
10.1007/978-3-030-24643-3_62
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper reviews few approaches on securely storing data in the cloud storage. Most of the cloud computing models aim towards ensuring that the data confidentiality and integrity prevails although users of the cloud use internet for using the services provided by the cloud computing system. The first mechanism considered involves checking that data integrity has been preserved or not through use of hash-function and metadata approach. The second mechanism involves making use of SHA-3 hash function to provide confidentiality as well as integrity for the data stored in cloud storage through use of the Mobile Cloud Computing (MCC) services.
引用
收藏
页码:522 / 528
页数:7
相关论文
共 50 条
  • [31] Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (01) : 71 - 81
  • [32] Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage
    Abbdal, Salah H.
    Jin, Hai
    Zou, Deqing
    Yassen, Ali. A.
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 510 - 515
  • [33] Self-certified Public Auditing for Data Integrity in Cloud Storage
    Zhang, Jianhong
    Zeng, Weina
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 267 - 273
  • [34] An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage
    Abbdal, Salah H.
    Jin, Hai
    Yassin, Ali A.
    Abduljabbar, Zaid Ameen
    Hussain, Mohammed Abdulridha
    Hussien, Zaid Alaa
    Zou, Deqing
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 412 - 417
  • [35] DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage
    Zheng, Xiangshuo
    Shen, Wenting
    Su, Ye
    Gao, Yuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 299 - 316
  • [36] Cloud Computing Data Storage Security framework relating to Data Integrity, Privacy and Trust
    Sirohi, Preeti
    Agarwal, Amit
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 115 - 118
  • [37] Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud server
    Kumar, Malay
    Vardhan, Manu
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) : 1251 - 1263
  • [38] Empowering Users of Cloud Computing on Data Confidentiality
    Khan, Khaled Md
    Shaheen, Mahboob
    2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 272 - 274
  • [39] A Survey on Data Confidentiality and Privacy in Cloud Computing
    Aloraini, Afnan
    Hammoudeh, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [40] CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing
    Wu, Jiaojiao
    Li, Yanping
    Wang, Tianyin
    Ding, Yong
    IEEE ACCESS, 2019, 7 : 160482 - 160497