A Survey on Cloud Computing Techniques for Data Integrity Checking
DOI:
https://doi.org/10.31686/ijier.vol7.iss6.1560

Keywords:
Cloud computing, data integrity, integrity checkingAbstract
Cloud computing is a term that used instead of internet to describe the infrastructure, software services and storage via internet. Large data centers are available in cloud for remotely store user data. The users have no data control privileges when the data transferred to the Cloud and they are not aware of any security risk. Data can be altered by unauthorized user, threats and dishonest server. Farther more, Data which are either unused for a long a time or takes large memory space can be deleted by cloud service provider. The main issue of cloud computing today is data integrity and how can be maintaining. There for, security challenges users are need to ensure that their data are integral by periodically Data integrity checking. Several integrity checking techniques have been proposed to ensure the data integrity in cloud storage. This paper provides a survey of various data integrity checking techniques for cloud data stored. Objective of this survey focusing on existing integrity check techniques for cloud data storage and presenting their characteristics, benefits, functionality and limitations.
Downloads
References
[2] Haichun Zhao,el[ ],A Survey on the Integrity Checking of Outsourced Data In Cloud Computing 2015.
[3] P.Parvathi, T.Meyyappan, Survey on Data Integrity Checking Protocols in Cloud Computing, International Journal of Computer Applications (0975 – 8887) International Conference on Computing and information Technology (IC2IT-2013)
[4] Charmee V. Desai, Prof. Gordhan B. Jethava, Survey on Data Integrity Checking Techniques in Cloud Data Storage, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 12, December 2014, ISSN: 2277 128X.
[5] Ms. R. K. Pandya, 2 Prof. K. K. Sutaria, Data Integrity Techniques in Cloud: An Analysis, Journal Of Information, Knowledge And Research In Computer Engineering Vol.02 Issue 02, (2013), ISSN: 0975 – 6760
[6] A. Methew, Security and Privacy Issues of Cloud computing: solution and secure framework, International Journal of Multidisciplinary Research Vol.2 Issue 4, (2012), ISSN 2231 5780
[7] Mahesh S.Giri and Bhupesh Gaur, Ph.D, Deepak Tomar, A Survey on Data Integrity Techniques in Cloud Computing, International Journal of Computer Applications (0975 – 8887) Volume 122 – No.2, July 2015
[8] B. Priyadharshini and P. Parvathi, “Data Integrity in Cloud Storage”, in Proceedings of IEEE 2012.
[9] P. Metri and G. Sarote, Privacy Issues and Challenges in Cloud Computing, International journal of Advanced Engineering Sciences and Technologies, Vol. No. 5, Issue No. 1,001-006.
[10] Sanchika Gupta,Anjani Srdan, Padam kumar,Ajit Abraham,”A Secure and Lightweight Approach for Critical Data Security in Cloud” in roc.CASoN-IEEE Jan 2012
[11] Wenjun Luo, Guojing Bai,”Ensuring the Data Integrity in Cloud Data Storage” in Proc. CCIS-IEEE Jan 2011
[12] R. Sravan kumar and Saxena ,”Data integrity proofs in cloud storage” in
Proceedings of IEEE 2011.
[13] MS. R. K. Pandya, Rof. K. K. Sutaria, Data Integrity Techniques in Cloud: An Analysis, Journal Of Information, Knowledge And Research Incomputer Engineering, Volume – 02, Issue – 02 Nov 12 To Oct 13, Issn: 0975 – 6760
[14] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599 – 616, 2009.
Downloads
Published
Issue
Section
License
Copyright (c) 2019 Rahma Teirab Abaker Haroun, Ahmed Khameis Sharaf Eldein AlKabour

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Copyrights for articles published in IJIER journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author for more visit Copyright & License.