A Survey on Data Integrity Techniques in Cloud Computing

  • S.Giri M
  • Gaur B
  • Tomar D
N/ACitations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing which is envisioned as the next generation architecture of IT Enterprise comes into focus when someone thinks about what IT always needs. It is way to increase capacity or add capabilities without investing in infrastructure as well as licensing cost on new software. Besides of this advantage there is one major problem that needs to face while keeping sensitive data in cloud, Assurance of data integrity that is data remain as it is on server for long time. Client cannot physically access the data from the cloud server directly, without client's knowledge, Cloud Service Provider (CSP) can alter or delete data which are either unused by client from a long a time or takes large memory space. Hence, there is need of checking the data periodically for its integrity, checking data for correction is called data integrity. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their limitations.

Cite

CITATION STYLE

APA

S.Giri, M., Gaur, B., & Tomar, D. (2015). A Survey on Data Integrity Techniques in Cloud Computing. International Journal of Computer Applications, 122(2), 27–32. https://doi.org/10.5120/21674-4762

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free