Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment

Authors

  • k khushi

  • Jasmeet Singh

Keywords:

cloud, data integrity, secure hash algorithm, station-to-station protocol, third party auditor

Abstract

Cloud computing is an internet based computing which provides different users an opportunity to store their data in the cloud While data outsourcing relieves the owner of the burden of the local data storage and maintenance but as they have no longer physical possession of outsourced data makes data integrity protection a very challenging task This paper explores the secure cryptographic hash function along with some other techniques that can be used by TPA to ensure the integrity of data stored in the cloud at regular intervals or on user request

How to Cite

k khushi, & Jasmeet Singh. (2013). Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment. Global Journal of Computer Science and Technology, 13(C4), 43–46. Retrieved from https://computerresearch.org/index.php/computer/article/view/346

Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment

Published

2013-03-15