Data Integrity Assurance Protocol without Data Verification in Cloud Environment

2013 ◽  
Vol 4 (5) ◽  
pp. 198-205
Author(s):  
YoonSu Jeong ◽  
SeungSoo Shin
2014 ◽  
Vol 16 (5) ◽  
pp. 71-76 ◽  
Author(s):  
Siddhartha Rao ◽  
◽  
Savan Gujrathi ◽  
Mithun Sanghvi ◽  
Shubham Shah

2011 ◽  
Vol 27 (5) ◽  
pp. 614-619 ◽  
Author(s):  
J.A. Ghaeb ◽  
M.A. Smadi ◽  
J. Chebil

2020 ◽  
Vol 11 (6) ◽  
pp. 843-850
Author(s):  
JONESTON DHAS J.L. ◽  
MARIA CELESTIN VIGILA S.

2018 ◽  
Vol 7 (3.34) ◽  
pp. 606
Author(s):  
Yoon Su Jeong ◽  
Sang Ho Lee

Background/Objectives: Cloud services are becoming popular with many users as they provide services based on the Internet. Users who use cloud services can integrate computing resources such as hardware and software, which exist in intangible form, through virtualization technology, and there is a great demand for security technologies related to security problems.Methods/Statistical analysis: As a result of the evaluation, the proposed method in the security evaluation and the performance evaluation resulted in better data integrity and security than the existing method. In addition, we checked the integrity of different cloud data and obtained the efficiency improved by O (logn) than the existing method.Findings: In this paper, we propose a robust data integrity protection scheme for various security attacks in the cloud environment. The proposed method effectively guarantees the integrity of the data used by the user through the generation and processing of low-load keys between the TPA, the user and the KGC. To protect the integrity of the data transmitted and received in the cloud environment, the proposed method generates the key through three processes (data generation process, encryption key generation process, and metadata attribute key pair generation process).Improvements/Applications: The key generated in this process is used by the anonymous key so that sensitive information of the cloud user is not exposed to a third party so that the important information of the user is not remembered. In addition, the proposed scheme keeps synchronization between the TPA and the user at a predetermined time interval so that the important information of the user is not illegally exploited from the third party.  


2019 ◽  
pp. 1273-1300
Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Avijit Das

With the help of cloud computing Mobile Cloud Computing (MCC) overcomes the limitations of a mobile device such as security, performance and environment. But, security of the data stored in the cloud is a very challenging issue. Since the cloud cannot be fully trusted, data stored in the cloud is not fully secured. Integrity of the stored data is very important for the data owner. Therefore, it is a big problem to maintain the integrity of the data stored in the cloud environment. This chapter discusses existing schemes for data integrity in the mobile cloud environment. In this chapter a scheme has been proposed for enhancing data integrity in Mobile Cloud Environment. To make integrity checking fast the size of the data file is used. It has also been shown that how fast the integrity loss can be detected if the file size is considered. Finally, the proposed scheme is compared with some of the existing scheme.


2018 ◽  
Vol 122 ◽  
pp. 1-15 ◽  
Author(s):  
Lei Zhou ◽  
Anmin Fu ◽  
Shui Yu ◽  
Mang Su ◽  
Boyu Kuang

Sign in / Sign up

Export Citation Format

Share Document