A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Survey of Integrity Verification in Cloud-Storage Using Various Techniques
English
2015
International Journal of Innovative Research in Computer and Communication Engineering
English
In cloud computing, an enormous amount of data is stored every day. Many organizations are now migrated to cloud and demand for resource is growing. ...
Though the providers are provide enough security there are still many security issues happening in cloud. This survey paper presents integrity verification of client data using various techniques. ...
From the two points, propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. ...
doi:10.15680/ijircce.2015.0303029
fatcat:6mwh7he7rfbildpt4fbouwlru4
Multi copy dynamic data in cloud Computing
2017
International Journal for Research in Applied Science and Engineering Technology
And there is rapid increase of organization opting for outsourcing data to remote cloud service provider. ...
In this paper, we are trying to propose a map-based provable multi copy dynamic data possession (MB-PMDDP) scheme that has the respective features: The customers will have an proof that the services provider ...
An Efficient & Secure Protocol For Data Storage In Cloud There are few existing remote integrity checking methods which serves static data and cannot be applied to the report service since the data in ...
doi:10.22214/ijraset.2017.4169
fatcat:2ilriteuhfhwvgq4ab4y3vzvyi
Secured Data Storage for RDPC Protocol with Enhanced TPA Auditing Scheme Using MHT in Cloud Computing
IJIREEICE - Electrical, Electronics, Instrumentation and Control
2014
IJIREEICE
IJIREEICE - Electrical, Electronics, Instrumentation and Control
Cloud computing enables vastly scalable services consumed over the Internet.Cloud storage is a model of data storage where the digital data is stored in logical pools.These cloud storage providers are ...
And to enable dynamics of data MHT is used to find the location of each data operation in the RDPC protocol. it allow the third party auditor (TPA) to check the integrity of outsourced data. d. ...
REMOTE DATA POSSESSION CHECKING PROTOCOL Remote data possession checking is a topic that focuses on how to frequently, efficiently and securely verify that a storage server can faithfully store its client's ...
doi:10.17148/ijireeice.2014.21111
fatcat:735k3g5cavcmjhou7zsekffy64
A Review on Identity-Based Proxy Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
2014
IJARCCE
This protocol will notice delegate checking, private checking, public checking. A. CONCRETE ID-PUIC PROTOCOL This protocol based on 4 methods: 1. ...
PCS (public cloud server): is an entity which handle valid storage capacity and computational resources to preserve the clients data. 3. ...
In order to overcome the victimization, proposed a ID-PUIC protocol. ID-PUIC protocol is a novel proxy oriented data uploading and remote data integrity checking model in public cloud, intended to B. ...
doi:10.17148/ijarcce.2017.64153
fatcat:pjduvzcf4fg33mhk427yorc47a
A Novel Approach for Data Uploading and Remote Data Integrity Checking Based On Public Key Cryptography
2017
International Journal of Advanced engineering Management and Science
From the security problems we propose "A NOVEL APPROACH FOR DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING BASED ON PUBLIC KEY CRYPTOGRAPHY" (ANDURIC-PKC). ...
New security problems need to be solved to give intact to the client data available in the cloud. Client has to feel that their outsourced data is in the protected way in the cloud. ...
ANDRIC-PKC may be a novel proxy-oriented data uploading and remote knowledge integrity checking model in public cloud. ...
doi:10.24001/ijaems.3.4.9
fatcat:xz2zox4fc5bi3fvynbmrw7lggy
Automated Identity based Approach to Verify Data Possession in Public Cloud
2015
International Journal of Computer Applications
As clients no longer have physical control of data, outsourced data integrity checking is of crucial importance in cloud storage. ...
As the verification is to be done at client end, the integrity checking protocol must be efficient to save client's time. ...
The remote data possession checking (RDPC) is a primarily designed to address the data integrity checking issue in company environment. ...
doi:10.5120/21824-5076
fatcat:qrzzv4irofe4neosqjqbhb426q
ID Based Data Integrity Checking in Public Cloud
2015
International Journal Of Scientific Research And Education
As clients no longer have physical control of data, outsourced data integrity checking is of crucial importance in cloud storage. ...
As the verification is to be done at client end, the integrity checking protocol must be efficient to save client's time. ...
The remote data possession checking (RDPC) is a primarily designed to address the data integrity checking issue in company environment. ...
doi:10.18535/ijsre/v3i701
fatcat:zcilv7urlnbd7pdfiwgdomqhxa
A Survey on Remote Data Integrity Checking in PCS with ID-Based Proxy minded Record Uploading
2017
International Journal of Recent Trends in Engineering and Research
record uploading and remote data integrity checking in public cloud (identity-PUIC). ...
However, remote data integrity checking is additionally an crucial security problem in public cloud garage. ...
SIGNIFICANCE OF REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD Remote Data-integrity assurance techniques go a long way in making a computer system secure. ...
doi:10.23883/ijrter.2017.3103.r1y1n
fatcat:ldryknv4evd33okgj2ty2u5jaq
A Metadata Verification Scheme for Data Auditing in Cloud Environment
2012
International Journal on Cloud Computing Services and Architecture
In the process of avoiding such an access this work designs a well secured, novel verification scheme that allows the vulnerable third party to perform verification as well as ensures data privacy in cloud ...
The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. ...
Remote Data Checking Using Provable Data Possession This paper [16] introduces a model for provable data possession that can be used for remote data checking. ...
doi:10.5121/ijccsa.2012.2405
fatcat:ucf33fn25vgbhaadbv5wl7xlmm
Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection
2019
International Journal of Scientific Research in Science and Technology
A novel public verification scheme for cloud storage using in distinguishability obfuscation, which requires a lightweight computation on the auditor and delegate most computation to the cloud. ...
The cloud security is one of the essential roles in cloud, here we can preserve our data into cloud storage. ...
From the two points, wepropose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. ...
doi:10.32628/ijsrst196250
fatcat:4b5txdyby5bbrirnxf2qu47zpu
Proxy Provable Data Possession in Public Clouds
2013
IEEE Transactions on Services Computing
From the two points, a novel distant information uprightness checking model is proposed, which is called as DPDP Distributed Provable Data Possession [8] . The replica and refuge sculpt are known. ...
Isolated information truthfulness examination is of critical significance in cloud store room [2] . ...
[6] Remote data integrity checking is important part while using cloud storage. [20]Cloud stores the data on multicloud servers. ...
doi:10.1109/tsc.2012.35
fatcat:d4zxobkzancrlhqmlqrskxab3i
EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN
2020
International Journal of Innovative Research in Computer Science & Technology
The main aim of this paper is to discuss the usage of cloud storage services, enabling individuals to store their information in the cloud and keep away from the local data storage and maintenance expense ...
Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud. ...
ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental ...
doi:10.21276/ijircst.2020.8.4.9
fatcat:5375uqbzungm3opqzjkv7fhw5i
Efficient and Secure Auditing of Cloud Data with Key -Updating
2016
International Journal of Science and Research (IJSR)
Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud. ...
Also develop a novel authenticator construction for forward security and the property of blockless verifiability. ...
The existing remote data possession checking (RDPC) protocols have been designed in the PKI (public key infrastructure) setting. ...
doi:10.21275/v5i5.nov163986
fatcat:qqf5okwjrnbafmp2cyaynffaye
A Survey on Data Integrity Methods in Cloud Storage
2018
European Journal of Engineering and Technology Research
In spite of these benefits, the major problem with data storage is that there is no guarantee of data consistency and integrity, which has become a major hurdle for using the services offered by cloud. ...
Now days IT industries are outsourcing their data by storing it remotely in cloud for reducing the load on local storage there by reducing the hardware, software and maintenance cost. ...
This overview presumes that taking into account the document size and static or element information record plan can be secured the outsourced information in the cloud server. ...
doi:10.24018/ejeng.2016.1.5.131
fatcat:en5xbk7hmrgrfh6lpsl2w65yte
NC-Audit: Auditing for network coding storage
2012
2012 International Symposium on Network Coding (NetCod)
We propose NC-Audit -a remote data integrity checking scheme, designed specifically for network codingbased storage cloud. ...
Independently, another body of work has proposed integrity checking schemes for cloud storage, none of which, however, is customized for network coding storage or can efficiently support repair. ...
CONCLUSION In this paper, we propose NC-Audit, a remote data integrity checking scheme for NC-based storage cloud. ...
doi:10.1109/netcod.2012.6261901
dblp:conf/netcod/LeM12
fatcat:eh33zmlopna2zpvhwfiphnkfly
« Previous
Showing results 1 — 15 out of 4,953 results