z-logo
open-access-imgOpen Access
Research on the Detection Algorithm of Data Integrity Verification Results in Big Data Storage
Author(s) -
Shi Yin
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1574/1/012008
Subject(s) - data integrity , computer science , big data , reliability (semiconductor) , data verification , cloud computing , authentication (law) , computer security , data security , data sharing , computer data storage , cloud storage , data mining , database , encryption , operating system , medicine , power (physics) , physics , alternative medicine , pathology , quantum mechanics
As one of the most widely used big data computing technologies, data cloud storage technology brings great convenience to users. However, while sharing data, it also causes data corruption and missing data integrity problems. Today’s verification of the integrity of remote data is publicly performed by trusted third parties. This makes the verifier have the potential threat of providing false information. The resulting validation data is untrustworthy. In order to ensure the security and integrity of data, technicians need to establish a data authentication results detection algorithm. Moreover, this algorithm ensures the reliability and utilization of data by improving the limited verification results.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here