Data Integrity Techniques in Cloud Computing: An Analysis
Abstract
Full Text:
PDFReferences
Wei-Tek Tsai, Xin Sun and Janaka Balasooriya “Service-Oriented Cloud Computing Architecture”, 7th International Conference on Information Technology: New Generations (ITNG) 2010.
Sravan Kumar R and Saxena, “Data Integrity Proofs in Cloud Storage”, Third International conference on Communication Systems and Networks (COMSNETS), PP1-4, IEEE-2011.
G Ateniese, R D Pietro, L V Mancini, and G Tsudik, “Scalable and Efficient Provable Data Possession”, 4th International Conference on Security and Privacy in Communication Networks, SecureComm - Istanbul, Turkey, 2008.
Balachandra Reddy Kandukuri, Ramakrishna Paturi V and Dr. Atanu Rakshit, "Cloud Security Issues”, Proceedings IEEE International Conference on Services Computing, September 2009.
Mahesh S giri, Bhupesh Gaur and Deepak Tomar, “A Survey on Data Integrity Techniques in Cloud Computing”, International Journal of Computer Applications, Volume 122, No.2, July 2015.
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores”, Proceedings of 14th ACM Conference on Computer and Communication Security, 2007.
S Ramgovind, M M Eloff, and E Smith, “The management of security in cloud computing”, Information Security for South Africa (ISSA), IEEE, PP1–7,2010.
C Erway, C Papamanthou, and R Tamassia, “Dynamic provable data possession” Proceedings of the 16th ACM conference on Computer and communications security, Berkeley, CA, USA, PP1–6, 2007.
R Sravan kumar and Saxena,”Data integrity proofs in cloud storage”, Third International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India 2011.
Chandran S and Angepat M, “Cloud Computing: Analyzing the risks involved in cloud computing environments,” in Proceedings of Natural Sciences and Engineering, Sweden, 2010.
Kevin D Bowers, Ari Juels, Alina Oprea, “Proofs of Retrievability: Theory and Implementation”, CCSW’09, in Proceedings of Journal of Systems and Software, May, 2012.
R Curtmola, O Khan, R Burns, and G Ateniese, “MR- PDP: Multiple-Replica Provable Data Possession,” in Proceedings of 28th IEEE ICDCS, 2008.
K D Bowers, A Juels, and A Oprea, “HAIL: A high availability and integrity layer for cloud storage”, in Proceedings of 16th ACM conference on Computer and communications security, 2009.
E Aguiar, Y Zhang and M Blanton, “An overview of issues and recent developments in cloud computing and storage security in high performance cloud auditing and applications”, Springer, PP3–33, 2014.
I Gul and M Islam, “Cloud computing security auditing”, International Conference on Next generation Information Technology (ICNIT), Gyeongju, Korea, PP143–148, 2011.
M A Shah, M Baker, J C Mogul, and R Swaminathan, “Auditing to keep online storage services honest”, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, 2007.
DOI: https://doi.org/10.23956/ijarcsse.v7i8.36
Refbacks
- There are currently no refbacks.