Survey on Cloud Auditing by Using Integrity Checking Algorithm and Key Validation Mechanism

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing can be used to access and storing data and delivery of different services over the internet. Using cloud storage, users can remotely store their data. Cloud service provider (CSP) provides data owners to store and access their valuable data in the cloud server and offers them to make use of on-demand data access without maintaining a local copy of their data. Even though this service avoids the data owners from making use of their third-party auditor, it certainly possesses serious security threats in maintaining the data owners cloud data. In addition, integrity is also an important issue in maintaining the data owners data stored in the cloud server. This survey presents an overview of integrity check and continuous auditing. The review work based on creating secure clouds by continuous auditing and cloud certification system (CCS) is used for high level security. This survey helps to provide the security by continuous auditing and overcome the integrity issues and to avoid the attacks by integrity checking algorithm and key validation mechanism. In this survey paper, various researchers’ ideas based on integrity checking and key schemes have been analyzed as literature review.

Cite

CITATION STYLE

APA

Mageshwari, M., & Naresh, R. (2023). Survey on Cloud Auditing by Using Integrity Checking Algorithm and Key Validation Mechanism. In Lecture Notes in Networks and Systems (Vol. 396, pp. 437–446). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-16-9967-2_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free