Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage

被引:0
|
作者
Srivastav, Niharika [1 ]
Mathew, Rejo [1 ]
机构
[1] NMIMS Deemed Be Univ, Mukesh Patel Sch Technol Management & Engn, Dept IT, Mumbai, Maharashtra, India
来源
PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018) | 2020年 / 31卷
关键词
Cloud computing; Storage; Data integrity and confidentiality; Metadata; Hash function; Mobile Cloud Computing (MCC);
D O I
10.1007/978-3-030-24643-3_62
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper reviews few approaches on securely storing data in the cloud storage. Most of the cloud computing models aim towards ensuring that the data confidentiality and integrity prevails although users of the cloud use internet for using the services provided by the cloud computing system. The first mechanism considered involves checking that data integrity has been preserved or not through use of hash-function and metadata approach. The second mechanism involves making use of SHA-3 hash function to provide confidentiality as well as integrity for the data stored in cloud storage through use of the Mobile Cloud Computing (MCC) services.
引用
收藏
页码:522 / 528
页数:7
相关论文
共 50 条
  • [21] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    Neela, K. L.
    Kavitha, V.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 115 - 124
  • [22] Secure data sharing with confidentiality, integrity and access control in cloud environment
    Rajkumar V.
    Prakash M.
    Vennila V.
    Computer Systems Science and Engineering, 2021, 40 (02): : 779 - 793
  • [23] Confidentiality Locking and Optimized Utilization with Data Deduplication in Cloud Storage
    Nmam Institute of Technology, Nitte University Nitte, Department of Information Science & Engineering, Udupi District
    574110, India
    IEEE Int. Conf. Networks, Multimed. Inf. Technol., NMITCON,
  • [24] An Approach to Verifying Data Integrity for Cloud Storage
    Chen, Yindong
    Li, Liping
    Chen, Ziran
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 582 - 585
  • [25] A SCHEME OF DATA CONFIDENTIALITY AND FAULT-TOLERANCE IN CLOUD STORAGE
    Fu, Yongkang
    Sun, Bin
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 228 - 233
  • [26] Shamir's Key based Confidentiality on Cloud Data Storage
    Kamalraj, D.
    Balamurugan, B.
    Jegadeeswari, S.
    Sugumaran, M.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 418 - 423
  • [27] A Mobile Cloud Middleware for Data Storage and Integrity
    Akherfi, Khadija
    Harroud, Hamid
    Gerndt, Michael
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 231 - 237
  • [28] Shamir's Key Based Confidentiality on Cloud Data Storage
    Durai, Kamalraj
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (01) : 48 - 53
  • [29] Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
    Oli, S. Arul
    Arockiam, L.
    2015 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND ELECTRICAL SYSTEMS (ICMES 2015), 2016, 40
  • [30] A Survey and a Data Integrity Proofs In Cloud Storage
    Kiruthika, V.
    Sree, B. R. Laxmi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 39 - 44