scholarly journals Data Integrity Checking Protocol with Data Dynamics in Cloud Computing

Author(s):  
Junjie Feng ◽  
Shigong Long
2018 ◽  
Vol 4 (8) ◽  
pp. 8
Author(s):  
Saloni Atre ◽  
Mayank Namdev

Cloud computing is an enormous area which shares huge amount of data over cloud services and it has been increasing with its on-demand technology. Since, with these versatile cloud services, when the delicate data stored within the cloud storage servers, there are some difficulties which has to be managed like its Security Issues, Data Privacy, Data Confidentiality, Data Sharing and its integrity over the cloud servers dynamically. Also, the authenticity and data access control should be maintained in this wide environment. Thus, Attribute based Encryption (ABE) is a significant version of cryptographic technique in the cloud computing environment. Data integrity, one of the most burning challenges in secure cloud storage. Data auditing protocols enable a verifier to efficiently check the integrity of the files without downloading the entire file from the cloud. In this paper cloud data integrity checking is performed by introducing attribute-based cloud data auditing where users can upload files to cloud through some set of attributes and specify auditor to check the integrity of data files. Existing protocols are mostly based on public key infrastructure or an exact identity, which lacks ?exibility of key management. In this research work Cloud data integrity checking is performed by introducing attribute-based cloud data auditing where users can upload files to cloud through some set of attributes and specify auditor to check the integrity of data files. Variable attributes are used to generate the private key and their performance is evaluated under variable attribute list.


Author(s):  
Rahma Haroun

Cloud computing is a term that used instead of internet to describe the infrastructure, software services and storage via internet. Large data centers are available in cloud for remotely store user data. The users have no data control privileges when the data transferred to the Cloud and they are not aware of any security risk. Data can be altered by unauthorized user, threats and dishonest server. Farther more, Data which are either unused for a long a time or takes large memory space can be deleted by cloud service provider. The main issue of cloud computing today is data integrity and how can be maintaining. There for, security challenges users are need to ensure that their data are integral by periodically Data integrity checking. Several integrity checking techniques have been proposed to ensure the data integrity in cloud storage. This paper provides a survey of various data integrity checking techniques for cloud data stored. Objective of this survey focusing on existing integrity check techniques for cloud data storage and  presenting their characteristics, benefits, functionality and limitations.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Ruoshui Liu ◽  
Jianghui Liu ◽  
Jingjie Zhang ◽  
Moli Zhang

Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. However, it keeps the data out of users' hands which would conventionally control and manage the data. Therefore, it becomes the key issue on how to ensure the integrity and reliability of the video data stored in the cloud for the provision of video streaming services to end users. This paper details the verification methods for the integrity of video data encrypted using the fully homomorphic crytosystems in the context of cloud computing. Specifically, we apply dynamic operation to video data stored in the cloud with the method of block tags, so that the integrity of the data can be successfully verified. The whole process is based on the analysis of present Remote Data Integrity Checking (RDIC) methods.


Sign in / Sign up

Export Citation Format

Share Document