z-logo
open-access-imgOpen Access
Integrity Verification Mechanisms Adopted In Cloud Environment
Author(s) -
Shakti Arora,
Surjeet Dalal
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.f1321.0986s319
Subject(s) - cloud computing , computer science , upload , data integrity , cloud storage , consistency (knowledge bases) , service provider , usability , computer security , service (business) , data security , database , distributed computing , world wide web , operating system , encryption , economy , artificial intelligence , economics
Cloud computing has changed the shape of computing world. Now a-days users are not worried about the computational cost and infrastructure cost because of the maximum availability of all the resources are available on demand. The most widely used feature used by the users are storage as a service given by the cloud computing providers. Users can upload and access the data anywhere anytime time with the help of internet access. As with the usability of the storage as a service, is increasing the risk of security of the information are also increasing. Data security on the cloud is the prominent area for researchers and number of techniques and algorithms has been proposed to assure the integrity, consistency and data availability. In this paper a number of data auditing mechanism used by different cloud providers have been discussed and optimized integrity verification mechanism have been proposed to overcome the limitations of existing approaches. The communication overheads are compiled and calculated with different input data size. A comparative analysis is also prepared to justify the proposed approach

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here