scholarly journals Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 6226-6239 ◽  
Author(s):  
Jialing He ◽  
Zijian Zhang ◽  
Meng Li ◽  
Liehuang Zhu ◽  
Jingjing Hu
IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 60897-60907 ◽  
Author(s):  
Junho Jeong ◽  
Jong Wha J. Joo ◽  
Yangsun Lee ◽  
Yunsik Son

Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


2017 ◽  
Vol 23 (4) ◽  
pp. 552-557 ◽  
Author(s):  
Matteo Monti ◽  
Steen Rasmussen

We summarize the results and perspectives from a companion article, where we presented and evaluated an alternative architecture for data storage in distributed networks. We name the bio-inspired architecture RAIN, and it offers file storage service that, in contrast with current centralized cloud storage, has privacy by design, is open source, is more secure, is scalable, is more sustainable, has community ownership, is inexpensive, and is potentially faster, more efficient, and more reliable. We propose that a RAIN-style architecture could form the backbone of the Internet of Things that likely will integrate multiple current and future infrastructures ranging from online services and cryptocurrency to parts of government administration.


2021 ◽  
Vol 13 (2) ◽  
pp. 83-95
Author(s):  
Matheus Ferraz Silveira ◽  
André L. S. Gradvohl

The Internet of Things aims to assign computational processing and connection to simple objects on a network tocollect data and then perform analysis. Due to its easy use, simplified implementation has several informationsecurity problems. This article presents attack procedures in an IoT environment using the Message QueueTelemetry Transport protocol. For attack procedures, we use the Low Orbit Ion Cannon and Wireshark programs,compromising the integrity, confidentiality, and availability of data and network connection. After carrying outthe attack procedures, we implemented security methods on the network, such as data encryption and firewall toprotect data integrity and prevent network connection attacks


Author(s):  
Sativilla Mohan Kumar ◽  
Advin Manhar

IoT is a chain of Physical Objects that are installed with sensors, software, and other technologies for the goal of connecting and transferring data with other devices and systems over the Internet. In many research, it has been found that the data and communication between the Internet of Things are insecure. Also, the data which is transferred from one end to the other end is accessible for a shorts distance. A discovered protocol for Data Integrity in IoT communication. A protocol for providing an environmental monitoring solution and a system that facilitates the practical experimentation of the IoT solutions. After the data is secured with the protocols and it has received an environment for the experiments, the message has to be sent over a long distance.


Sign in / Sign up

Export Citation Format

Share Document