TPA Ensuring Data Integrity in Cloud Environment

α
k khushi
k khushi
σ
Jaspreet Kaur
Jaspreet Kaur M.Tech(CSE)
ρ
Jasmeet Singh
Jasmeet Singh
α RIMT-IET, Mandi Gobindgarh/ Punjab Techincal University
σ Lovely Professional University Lovely Professional University

Send Message

To: Author

TPA Ensuring Data Integrity in Cloud Environment

Article Fingerprint

ReserarchID

CSTSDE1UM8U

TPA Ensuring Data Integrity in Cloud Environment Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Cloud computing is an internet based computing where virtual shared servers provide software, infrastructure, platform and other resources to customers on a pay-as-you-use basis. In one of the services offered by cloud viz. Storage as a Service, users outsource their data to cloud without having direct possession or control on it. Storage of large data in cloud reduces costs and maintenance. But the customer is unaware of the storage location. Here risk involved is modification of data or tampering of data. In this paper we propose a data correctness scheme in which Third Party can audit the data stored in the cloud and assure the customer that the data is safe. Hence we implemented a scheme for verifying integrity of data. Such verification systems prevent the cloud storage archives (storage) from misrepresenting or modifying the data stored by using frequent checks on the storage archives.

References

12 Cites in Article
  1. Murugesan Malathi (2012). A Scheme for Checking Data Correctness in the Cloud.
  2. Miss Sowparnika1,Prof Dheenadayalu2 (2013). Improving data integrity on cloud storage services.
  3. N Madhuri,T Suneetha,A Haritha,P Lakshmi (2013). A Protocol for Ensuring Data Integrity in Cloud Environment.
  4. Xu Chun-Xiang,Daniel He Xiao-Hu,Abraha (2006). Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing.
  5. K Govinda,E Sathiyamoorthy (2012). Data Auditing in Cloud Environment using Message Authentication Code.
  6. K Govinda,V Gurunathprasad,H Sathishkumar (2012). Third Party Auditing for Secure Data Storage in Cloud through Digital Signature using RSA.
  7. Abhishek Mohta,Lalit Kumar Awasthi (2012). Cloud Data Security while using Third Party Auditor.
  8. Akkala Saibabu,T Murthy (2012). Security Provision in Publicly Auditable Secure Cloud Data Storage Services using SHA-1 Algorithm.
  9. Sara Reenu,Georeg,S Sabitha (2013). Survey on Data Integrity in Cloud Computing.
  10. Hiren Patel,Dhiren Patel (2012). A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor.
  11. S Jeyadevan,Dr Basavarij,Patel (2012). A DATA INTEGRITY VERIFICATION IN CLOUD COMPUTING.
  12. Dalia Attas,Omar Batrafi Efficient integrity checking technique for securing client data in cloud computing.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

k khushi. 2014. \u201cTPA Ensuring Data Integrity in Cloud Environment\u201d. Global Journal of Computer Science and Technology - C: Software & Data Engineering GJCST-C Volume 13 (GJCST Volume 13 Issue C13): .

Download Citation

Issue Cover
GJCST Volume 13 Issue C13
Pg. 7- 11
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

January 26, 2014

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 9335
Total Downloads: 2344
2026 Trends
Related Research

Published Article

Cloud computing is an internet based computing where virtual shared servers provide software, infrastructure, platform and other resources to customers on a pay-as-you-use basis. In one of the services offered by cloud viz. Storage as a Service, users outsource their data to cloud without having direct possession or control on it. Storage of large data in cloud reduces costs and maintenance. But the customer is unaware of the storage location. Here risk involved is modification of data or tampering of data. In this paper we propose a data correctness scheme in which Third Party can audit the data stored in the cloud and assure the customer that the data is safe. Hence we implemented a scheme for verifying integrity of data. Such verification systems prevent the cloud storage archives (storage) from misrepresenting or modifying the data stored by using frequent checks on the storage archives.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

TPA Ensuring Data Integrity in Cloud Environment

Jaspreet Kaur
Jaspreet Kaur Lovely Professional University
Jasmeet Singh
Jasmeet Singh

Research Journals