Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment
Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment

Keywords

cloud
data integrity
secure hash algorithm
station-to-station protocol
third party auditor

How to Cite

k khushi, & Jasmeet Singh. (2013). Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment. Global Journal of Computer Science and Technology, 13(C4), 43–46. Retrieved from https://gjcst.com/index.php/gjcst/article/view/1573

Abstract

Cloud computing is an internet based computing which provides different users an opportunity to store their data in the cloud While data outsourcing relieves the owner of the burden of the local data storage and maintenance but as they have no longer physical possession of outsourced data makes data integrity protection a very challenging task This paper explores the secure cryptographic hash function along with some other techniques that can be used by TPA to ensure the integrity of data stored in the cloud at regular intervals or on user request
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2013 Authors and Global Journals Private Limited