scholarly journals Cloud Computing: An Exploration on Data Integrity and Its Techniques

2019 ◽  
Vol 8 (1) ◽  
pp. 44-49
Author(s):  
R. K. Ramesh . ◽  
K. L. Neela .

In the recent years, the cloud computing moves a step forward by providing more services for the individual users and organizations. Each and every technology and systems can be easily integrated with cloud environment. In future lot of new technology will come to play their role. But to make the new technology fulfill their role they surely need a small part of cloud computing. The cloud plays a vital role in managing the data of different users. Users may be individual or organization and they use any cloud deployment model. Cloud provides low cost unpredictable and untraceable storage space to store user’s data. The main aim is to keep the data reliable, available, secure and sharable for the authorized users. But keeping the data secure is a big issue .In a public cloud any one can access the cloud easily. But the CSP or data owner has to prevent the unauthorized user’s access to the cloud. CSP can easily modify or delete the data which are not used by the user for a long time so as to get the storage space .The data integrity problem can be overcome by some different techniques which are proposed in various models .We can surely say that this cloud computing technology will become popular than any other technology.

Author(s):  
Shrutika Khobragade ◽  
Rohini Bhosale ◽  
Rahul Jiwahe

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.


2019 ◽  
pp. 1273-1300
Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Avijit Das

With the help of cloud computing Mobile Cloud Computing (MCC) overcomes the limitations of a mobile device such as security, performance and environment. But, security of the data stored in the cloud is a very challenging issue. Since the cloud cannot be fully trusted, data stored in the cloud is not fully secured. Integrity of the stored data is very important for the data owner. Therefore, it is a big problem to maintain the integrity of the data stored in the cloud environment. This chapter discusses existing schemes for data integrity in the mobile cloud environment. In this chapter a scheme has been proposed for enhancing data integrity in Mobile Cloud Environment. To make integrity checking fast the size of the data file is used. It has also been shown that how fast the integrity loss can be detected if the file size is considered. Finally, the proposed scheme is compared with some of the existing scheme.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has emerged as a new technology that allows the users to acquire resources at anytime, anywhere by connecting with internet. It provides the options to users for renting of infrastructure, storage space, and services. One service issue that affects the QoS of cloud computing is network latency while dealing with real-time application. In this, the user interacts directly with application but delays in receiving the services, and jitter delay will encourage the user to think about this. In today's world, clients are moving towards the IoT techniques, enabling them to connect all things with internet and get their services from cloud. This advancement requires introduction of new technology termed as “fog computing.” Fog computing is an extension of cloud computing that provides the service at the edge of the network. Its proximity to end users, mobility support, and dense distribution reduces the service latency and improves QoS. This fog model provides the prosperity for advertisement and entertainment and is well suited for distributed data model.


2020 ◽  
Vol 1 (2) ◽  
pp. 78-83
Author(s):  
Shrutika Khobragade ◽  
Rohini Bhosale ◽  
Rahul Jiwane

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.


Cloud computing is one of the important business models in the modern Information Technology. It provides various services (hardware, software) to the users with minimal interaction and low-cost. Storage service is one of the most useful services in cloud computing, which move data owners data from local computing system to the cloud. In this paradigm, once the data moves from the local computing system to the cloud, the data owner lost the physical control of the outsourced data on the cloud. So that, storage service creates data security challenges. Therefore, the integrity of the outsourced data has to be verified frequently using public or private verification method. In this paper we focus on two data security concern such as data confidentiality and remote data integrity on cloud storage system. In order to ensure the data integrity and reduce the data owners computational resources, in this work we have proposed a remote data integrity auditing methods such as Remote Data Audit using Protocol(RDAP) and Remote Data Audit using Digital Signature (RDADS) methods. To analyze the performance of the system, first, we define the single data owner on multiple servers and then multiple data owners on a single server for public data verification. Besides, these methods not only verify the integrity of data, but also detect the invalid data block during the verification process.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has emerged as a new technology that allows the users to acquire resources at anytime, anywhere by connecting with internet. It provides the options to users for renting of infrastructure, storage space, and services. One service issue that affects the QoS of cloud computing is network latency while dealing with real-time application. In this, the user interacts directly with application but delays in receiving the services, and jitter delay will encourage the user to think about this. In today's world, clients are moving towards the IoT techniques, enabling them to connect all things with internet and get their services from cloud. This advancement requires introduction of new technology termed as “fog computing.” Fog computing is an extension of cloud computing that provides the service at the edge of the network. Its proximity to end users, mobility support, and dense distribution reduces the service latency and improves QoS. This fog model provides the prosperity for advertisement and entertainment and is well suited for distributed data model.


Author(s):  
Abirami. S ◽  
Shanmuga Priya. P

Cloud computing associate the computing and storage resources controlled by different operating systems to make available services such as large-scaled data storage and high performance computing to users. The benefits of low-cost, negligible management (from a user's perspective), and greater flexibility come with increased security concerns is one of the most crucial aspects among those prohibiting the wide-spread adoption of cloud computing. The data outsourced to a public cloud must need to be secured. This work gives Division and Replication of Data (DROPs) inside the Cloud for Optimal Performance and Security that judicially fragments user files into portions and replicates them at strategic places in the cloud. The division of a files into fragments is achieved based on a given consumer standards such that the individual fragments do not comprise any meaningful facts. The node separation is ensured by the means of the Grid Topology algorithm. To further improve the retrieval time, replicate fragments over the nodes that generate the highest read/write requests. The data encrypted using AES encryption algorithm. Duplication checking is implementing to provide efficient storage and time based access control for secure file access system.


Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Avijit Das

With the help of cloud computing Mobile Cloud Computing (MCC) overcomes the limitations of a mobile device such as security, performance and environment. But, security of the data stored in the cloud is a very challenging issue. Since the cloud cannot be fully trusted, data stored in the cloud is not fully secured. Integrity of the stored data is very important for the data owner. Therefore, it is a big problem to maintain the integrity of the data stored in the cloud environment. This chapter discusses existing schemes for data integrity in the mobile cloud environment. In this chapter a scheme has been proposed for enhancing data integrity in Mobile Cloud Environment. To make integrity checking fast the size of the data file is used. It has also been shown that how fast the integrity loss can be detected if the file size is considered. Finally, the proposed scheme is compared with some of the existing scheme.


Author(s):  
P. Thomas

While the adoption of new technology is being increasingly recognised as a catalyst for transformation in higher education, the high cost of technology infrastructure and other related resources is a financial burden, and hence, a barrier to many higher education institutions, especially in the context of the recent economic recession. Indications are that the adoption of the low-cost and even free (in some cases) cloud computing solutions could bring about large scale adoption of new technology by higher education institutions. This chapter provides an overview of cloud computing, explores the challenges around cloud computing, details the significant benefits that it can bring to higher education, and discusses how organizations could harness cloud services to significantly reduce capital and maintenance costs on educational technology and to enhance its scalability, accessibility, and flexibility. The chapter further recommends the use of hybrid cloud deployment to achieve a balance between risks and benefits of this new computing paradigm.


Author(s):  
Steffina Muthukumar ◽  
S D Karthik ◽  
Diya D Jain ◽  
Rohit Ravindran

Cloud computing has drawn expanding interests from both scholastic and industry in the recent years because of its productiveness and low-cost management. Since it offers different types of assistance in an open organization, it is critical for users to utilize secure information for stockpiling and sharing data to guarantee information classification and data users protection. To safely Protect information, the most broadly utilized technique is encryption. The dual-access control, with regards to cloud-based storage, is a control system over both the data owner and the user who can upload and download files without loss of safety, data[1] and effectiveness. The credulous arrangement is that the user can download the whole database[2]. The framework planned in this paper is when the A user logs in with his credentials and after successful acceptance from the two different administrators, the user will be able to download the file present over the cloud. When a malicious user requests, the administrators can find it because it will generate a null value and they can block the user from downloading the files.


Sign in / Sign up

Export Citation Format

Share Document