Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Survey on Cloud Data Integrity: Issues and Current Solutions

Author : Shivaraj Hiremath 1 Sanjeev R Kunte 2

Date of Publication :7th September 2016

Abstract: Cloud computing is a general term for the delivery of hosted services over the internet. The cloud is a platform where data owner remotely store their data in the cloud to enjoy the high quality applications and services. Inspite of many advantages associated with cloud computing, accessing and storing data on cloud storage has some security risks. For sensitive and confidential data there should be some security mechanisms. In this paper, we present cloud data integrity issues that are preventing people from adopting the cloud and we give a survey on the solutions that have been done to minimize risks of these issues.

Reference :

    1. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1 – 11, 2011.
    2. Amazon.com, “Amazon Web Services (AWS),” Online at http://aws. amazon.com, 2008.
    3. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for data storage security in cloud computing,”. In INFOCOM, Proceedings IEEE, pp. 1–9, 2010.
    4. K. Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409_428, 2012.
    5. B. Balusamy, P. Venkatakrishna, A. Vaidhyanathan, M. Ravikumar, and N. Devi Munisamy, “Enhanced security framework for data integrity using third-party auditing in the cloud system,” Advances in Intelligent Systems and Computing. Springer India, vol. 325, pp. 25– 31, 2015
    6. C.Wang, Q.Wang, K. Ren, andW. Lou, “Ensuring data storage security in cloud computing,”. In Proceedings of IWQoS’09, pp. 1–9, July 2009.
    7. Juels Jr., A., Kaliski, B.S, “Pors: proofs of retrievability for large files”. In Proceedings of the ACM Conference on Computer and Communications Security, pp. 584–597. 2007.
    8. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X. “Provable data possession at untrusted stores”. In Proceedings of the ACM Conference on Computer and Communications Security, pp. 598–609, 2007.
    9. Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G, “Scalable and efficient provable data possession”. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, pp. 1– 10, 2008.
    10. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing”. In Proceedings of ESORICS’09, volume 5789 of LNCS. Springer-Verlag, pp. 355–370, Sep. 2009.
    11. S. Halevi, D. Harnik, B. Pinkas, and A. ShulmanPeleg, “Proofs of ownership in remote storage systems.” In Proceedings of the 18th ACM conference on Computer and communications security. ACM, pp. 491–500, 2011
    12. Mainul Mizan, Md Lutfor Rahman, Rasib Khan, Munirul Haque, Ragib Hasan, “Accountable Proof of Ownership for Data using Timing Element in Cloud Services”. In Proceedings of International Conference on High Performance Computing and Simulation (HPCS), 2013
    13. Harshest. K. Raj, “A Survey on Cloud Computing”, Internal Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issues 9, July 2014
    14. W. A. Sultan Aldossary, "Data Security, Privacy, Availability and Integrity in cloud computing". International Journal of Advanced Computer Science and Applications,Vol. 7, No. 4, 2016.

Recent Article