A survey on data auditing approaches to preserve privacy and data integrity in cloud computing

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is recognized as one of the prominent and rapid growing technologies in this contemporary world. Cloud allows the users to store the data without any physical infrastructure and it provides access to the users over the internet anywhere and at any time without harming its accuracy and reliability. However, on the other hand storing data in the cloud creates an inconvenience to the users by creating security issues like data integrity, privacy & availability in cloud. Security exists as one of the recent research challenges in the cloud. The data stored on the cloud can be hacked and altered by any person and sometimes even the data can be deleted by the Cloud Service Provider (CSP) for his own personal benefit. So, there exist many solutions to solve the security issues in the cloud. Data auditing is found as one of the popular approach to provide integrity and privacy using Third Party Auditor (TPA). In this paper, pros and cons of six different data auditing schemes are discussed along with the results.

Cite

CITATION STYLE

APA

Kavya, V., Sumathi, R., & Shwetha, A. N. (2020). A survey on data auditing approaches to preserve privacy and data integrity in cloud computing. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 39, pp. 108–118). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-34515-0_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free