Author : Shivaraj Hiremath 1
Date of Publication :7th September 2016
Abstract: Cloud computing is a general term for the delivery of hosted services over the internet. The cloud is a platform where data owner remotely store their data in the cloud to enjoy the high quality applications and services. Inspite of many advantages associated with cloud computing, accessing and storing data on cloud storage has some security risks. For sensitive and confidential data there should be some security mechanisms. In this paper, we present cloud data integrity issues that are preventing people from adopting the cloud and we give a survey on the solutions that have been done to minimize risks of these issues.
Reference :
-
- S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1 – 11, 2011.
- Amazon.com, “Amazon Web Services (AWS),” Online at http://aws. amazon.com, 2008.
- C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for data storage security in cloud computing,”. In INFOCOM, Proceedings IEEE, pp. 1–9, 2010.
- K. Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409_428, 2012.
- B. Balusamy, P. Venkatakrishna, A. Vaidhyanathan, M. Ravikumar, and N. Devi Munisamy, “Enhanced security framework for data integrity using third-party auditing in the cloud system,” Advances in Intelligent Systems and Computing. Springer India, vol. 325, pp. 25– 31, 2015
- C.Wang, Q.Wang, K. Ren, andW. Lou, “Ensuring data storage security in cloud computing,”. In Proceedings of IWQoS’09, pp. 1–9, July 2009.
- Juels Jr., A., Kaliski, B.S, “Pors: proofs of retrievability for large files”. In Proceedings of the ACM Conference on Computer and Communications Security, pp. 584–597. 2007.
- Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X. “Provable data possession at untrusted stores”. In Proceedings of the ACM Conference on Computer and Communications Security, pp. 598–609, 2007.
- Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G, “Scalable and efficient provable data possession”. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, pp. 1– 10, 2008.
- Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing”. In Proceedings of ESORICS’09, volume 5789 of LNCS. Springer-Verlag, pp. 355–370, Sep. 2009.
- S. Halevi, D. Harnik, B. Pinkas, and A. ShulmanPeleg, “Proofs of ownership in remote storage systems.” In Proceedings of the 18th ACM conference on Computer and communications security. ACM, pp. 491–500, 2011
- Mainul Mizan, Md Lutfor Rahman, Rasib Khan, Munirul Haque, Ragib Hasan, “Accountable Proof of Ownership for Data using Timing Element in Cloud Services”. In Proceedings of International Conference on High Performance Computing and Simulation (HPCS), 2013
- Harshest. K. Raj, “A Survey on Cloud Computing”, Internal Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issues 9, July 2014
- W. A. Sultan Aldossary, "Data Security, Privacy, Availability and Integrity in cloud computing". International Journal of Advanced Computer Science and Applications,Vol. 7, No. 4, 2016.