Survey on Data Integrity Checking Protocols in Cloud Computing

Cloud computing is an internet based computing model that supports convenient, on-demand and pay-for-use model. In this computing, data owners host their data on cloud servers and clients can access the data from cloud servers. Due to the data outsourcing, efficient verification of the outsourced data becomes a formidable challenge for data security in Cloud Computing (CC). Therefore, an independent auditing service is required to make sure that the data is correctly hosted in the cloud. Several protocols are introduced for performing integrity in cloud storage. This paper focuses on the different integrity checking protocols to address the above issue.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
International Journal of Computer Applications
Topic:
Security
Format:
PDF