Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage

被引:0
|
作者
Srivastav, Niharika [1 ]
Mathew, Rejo [1 ]
机构
[1] NMIMS Deemed Be Univ, Mukesh Patel Sch Technol Management & Engn, Dept IT, Mumbai, Maharashtra, India
来源
PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018) | 2020年 / 31卷
关键词
Cloud computing; Storage; Data integrity and confidentiality; Metadata; Hash function; Mobile Cloud Computing (MCC);
D O I
10.1007/978-3-030-24643-3_62
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper reviews few approaches on securely storing data in the cloud storage. Most of the cloud computing models aim towards ensuring that the data confidentiality and integrity prevails although users of the cloud use internet for using the services provided by the cloud computing system. The first mechanism considered involves checking that data integrity has been preserved or not through use of hash-function and metadata approach. The second mechanism involves making use of SHA-3 hash function to provide confidentiality as well as integrity for the data stored in cloud storage through use of the Mobile Cloud Computing (MCC) services.
引用
收藏
页码:522 / 528
页数:7
相关论文
共 50 条
  • [1] Efficient Cloud Storage Confidentiality to Ensure Data Security
    Arockiam, L.
    Monikandan, S.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [2] Moncrypt: A technique to ensure the confidentiality of outsourced data in cloud storage
    Manikandasaran S.S.
    Arockiam L.
    Sheba Kezia Malarchelvi P.D.
    International Journal of Information and Computer Security, 2019, 11 (01) : 1 - 16
  • [3] Survey on public auditability to ensure data integrity in cloud storage
    School of Computer Science Engineering, VIT University, Chennai, India
    Int J Comput Appl, 3-4 (102-110):
  • [4] Integrity and Confidentiality in Cloud Outsourced Data
    Rady, Mai
    Abdelkader, Tamer
    Ismail, Rasha
    AIN SHAMS ENGINEERING JOURNAL, 2019, 10 (02) : 275 - 285
  • [5] A NEURAL DATA SECURITY MODEL: ENSURE HIGH CONFIDENTIALITY AND SECURITY IN CLOUD DATA STORAGE ENVIRONMENT
    Jegadeeswari, S.
    Dinadayalan, P.
    Gnanambigai, N.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 400 - 406
  • [6] A New Framework for Cloud Storage Confidentiality to Ensure Information Security
    Singh, Deepak
    Verma, Harsh K.
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [7] Confidentiality and Storage of Data in Cloud Environment
    Mohit, Prerna
    Biswas, G. P.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 289 - 295
  • [8] Use of Intel SGX to ensure the confidentiality of data of cloud users
    Zegzhda D.P.
    Usov E.S.
    Nikol’skii A.V.
    Pavlenko E.Y.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 848 - 854
  • [9] Achieving an effective, confidentiality and integrity of data in cloud computing
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    International Journal of Network Security, 2019, 21 (02) : 326 - 332
  • [10] The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing
    Rukavitsyn, Andrey N.
    Borisenko, Konstantin A.
    Holod, Ivan I.
    Shorov, Andrey V.
    PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 272 - 274