Data Integrity Protection in Cloud Computing for Constrained Computing Resources

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
Using cloud computing user will be able to store and secure their data without burden of local computer. Additionally, users should be able to just use the cloud storage as if it is local, without distressing about the need to verify its integrity. By enabling and using public audit for cloud storage, it can check the integrity of the data. Finding data that are corrupted using this is difficult. To have original data integrity for the authors' cloud user by Cloud Server Provider (CSP) replica should be taken.
Download Now

Find By Topic