Data Integrity Attacks in Cloud Computing: A Review of Identifying and Protecting Techniques

  • Kaja D
  • Fatima Y
  • Mailewa A
N/ACitations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing is growing tremendously in recent years. Many organizations are switching their traditional computing model to a cloud based because of its low cost and pay-as-you-go manner. Although Cloud Service Provider (CSP) ensures that the data stored in their remote cloud server will be intact and secure. But there are many data integrity issues exist that needed to be addressed. In Cloud environment, lack of data integrity is a major concern. In this paper, we have surveyed several past studies which identifies the issues related to the cloud data storage security such as data theft, unavailability, and data breach of cloud server data. We have also provided a detailed analysis of types of data integrity attacks and their mitigation techniques.

Cite

CITATION STYLE

APA

Kaja, D. V. S., Fatima, Y., & Mailewa, A. B. (2022). Data Integrity Attacks in Cloud Computing: A Review of Identifying and Protecting Techniques. International Journal of Research Publication and Reviews, 713–720. https://doi.org/10.55248/gengpi.2022.3.2.8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free