On Security and Data Integrity Framework for Cloud Computing Using Tamper-Proofing

28Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The cloud computing has become an emerging issue in IT industry as well as in academics due to its variant advantages. Cloud computing consist of many computing possessions like memory, storage and processor which are not physically available at the user’s site. These devices are stored outside and controlled by the cloud service providers, there is always a risk of losing data or the data may be altered by internal as well as external attackers. However, it may not be fully trustworthy because the user does not have copy of all stored data which refer to the fact that while users can put their files into the cloud server, nobody knows that where exactly they should be. Further, it poses various security challenges as generating secure and reliable data storage over unreliable cloud service provider. The data integrity is one of the prime concern in cloud computing. This paper presents a framework for data integrity in cloud computing using tamper-proofing algorithms (TPA) such as tamper-proof checking code (TPC) and tamper- resistance (TPR).

Cite

CITATION STYLE

APA

Ansari, M. D., Gunjan, V. K., & Rashid, E. (2021). On Security and Data Integrity Framework for Cloud Computing Using Tamper-Proofing. In Lecture Notes in Electrical Engineering (Vol. 698, pp. 1419–1427). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-7961-5_129

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free