Data Integrity Authentication Techniques in Cloud Computing: A Survey

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is a visible or feasible solution to IT industry. It is famed among business owners because it removes the need for users to plan ahead of initiating business. It let the users free to start from scratch and increase their resources only when there is a growth in the business. Though, regardless of the truth that cloud computing offers vast opportunities to enterprises, users need to put their data over the remotely located cloud servers and lose their control over data after storing on cloud. Consequently, security and integrity of data that users put over the cloud are the foremost concern of cloud computing. Occasionally, cloud service provider (CSP) can tamper or delete the data which is not used by the users from a long time or engaged large memory space. So, there is a demand to verify the data from time to time, to maintain its integrity. Examining data to check the correctness of data is called data integrity. To conquer the problem of data integrity, various techniques are proposed underneath different systems and privacy models. This paper covers various data integrity proving techniques.

Cite

CITATION STYLE

APA

Thakur, N., Singh, A., & Sangal, A. L. (2020). Data Integrity Authentication Techniques in Cloud Computing: A Survey. In Advances in Intelligent Systems and Computing (Vol. 1053, pp. 1255–1267). Springer. https://doi.org/10.1007/978-981-15-0751-9_115

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free