Survey on Data Integrity in Cloud Computing
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
Data outsourcing to cloud storage has recently become a trend. Economic advantage is the significant reason. A large number of clients or data owners store their important data in remote servers in the cloud and it is provided back to them whenever needed. Data owners don’t even leave a copy of the data in their local computers so as to save the storage space. By sending the data to be processed in the cloud, data owners transfer control of their data to a remote party that may raise security challenges. Sometimes the data stored in the cloud is so important that the clients must ensure that it is not lost or corrupted, i.e., the integrity of data has to be ensured. A lot of works have been done on designing remote data integrity checking protocols, which allow data integrity to be checked without completely downloading the data. This paper surveys the various protocols to check cloud data integrity and compares them based on the integrity requirements.
Authors and Affiliations
Reenu Sara George , Sabitha S,
DOCUMENT FAXING THROUGH MOBICLOUD USING ANDROID
This paper discusses about the software which is developed for the Android mobile devices for widely used in the Business fields as well as our day to day life activities. In this era of paperless offices and digit...
A Countermeasure for Black Hole Attack in Mobile WiMAX Networks
Mobile WiMAX has drawn much attention due to its benefits. Nevertheless, security is a challenge and has to be ensured. The attacker may make use of parts of unencrypted management messages and acquire information about...
ARCHITECTURE OF 4-BIT PIPELINE ADC IN CMOS TECHNOLOGY
Analog-to-digital converters (ADCs) are key design blocks and are currently adopted in many application fields to improve digital systems, which achieve superior performances with respect to analog solutions. With th...
Scalable Multicasting and Sustaining Proficient Over Mobile Ad Hoc Networks: MANET
Cluster interactions are imperative in Mobile Ad hoc Networks (MANET). Multicast is an proficient technique for implementing cluster connections. However, it is exigent to execute competent and scalable multicast in MANE...
Healthcare Information Technology Service Assessment: A Healthcare Leader Prospective
Information technology has evolved over the years and comply its presence in all the industrial sectors and healthcare is not an exception. It has become more and more necessary for every health care professional...