Abstract
Cloud computing refers to data sharing, storing of data in cloud storage and sharing resources to the client. While considering data it should be securely protected from unauthorized access. Everything regarding the data security is a top threatening issues, in this paper we discuss about the data integrity issues of the cloud. How the server maintained the data without any loss or any damage using some encryption techniques. In this paper integrity checking is considered as an issue where some unauthorized person is accessing the data. Here the authorization of the data is checked by the data owner or a TPA—third party auditing using RSA and MD5 cryptographic algorithm. The data owner is responsible for giving access permission for the data which it may be public or private for integrity checking. Here the proposed system tells about how the third party auditing checks the integrity to avoid the overwhelming workload for the data owner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework (pp. 1–14).
Yu, Y., et al. (2017). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767–778.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.
Mahalakshmi, B., & Suseendran, G. (2016). Effectuation of secure authorized deduplication in hybrid cloud. Indian Journal of Science and Technology, 9(25).
Wang, B., Chow, S. S. M., Li, M., & Li, H. (2013). Storing shared data on the cloud via security-mediator. In Proceedings of International Conference on Distributed Computing Systems (pp. 124–133).
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. 2012 International Conference on Computer Science and Electronics Engineering, 1(973), 647–651.
Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485–498.
Tate, S. R., & Mikler, A. R. (2003). Performance evaluation of data integrity Vandana Gunupudi thesis prepared for the Degree of Master of Science. December 2003 APPROVED.
Jayani, V. E. A., Ulasi, K. T., & Unitha, D. R. P. S. (2016). Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Transactions on Computers, 8(16), 3146–3152.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.
Kumar, S., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64, 12–22.
Botta, A., De Donato, W., Persico, V., & Pescap, A. (2014). On the integration of cloud computing and internet of things.
Raghavendra, S., et al. (2016). Survey on data storage and retrieval techniques over encrypted cloud data. International Journal of Computer Science and Information Security, 14(9).
Fabian, B., Ermakova, T., & Junghanns, P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems, 48(May), 132–150.
Yang, K., Member, S., Jia, X., & Member, S. (2012). An efficient and secure dynamic auditing protocol for data storage in cloud computing (pp. 1–11).
Liu, C., Yang, C., Zhang, X., & Chen, J. (2015). External integrity verification for outsourced big data in cloud and IoT: A big picture. Future Generation Computer Systems, 49(August 2014), 58–67.
Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2008). Scalable and efficient provable data possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks 2008 (p. 1).
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: Taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369–392.
Katkade, S., & Katti, J. V. (2017). Integrity check of shared data on cloud with various mechanisms. International Journal of Computer Applications, 159(6), 1–3.
Halevi, S., Harnik, D., Pinkas, B., & Haim, E. (2013). Proof of ownership in remote storage systems PoW solution : A general protocol security-efficiency tradeoff.
Wang, B., Li, B., & Li, H. (2015). Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Transactions on Services Computing, 8(1), 92–106.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mahalakshmi, B., Suseendran, G. (2019). An Analysis of Cloud Computing Issues on Data Integrity, Privacy and Its Current Solutions. In: Balas, V., Sharma, N., Chakrabarti, A. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-1274-8_35
Download citation
DOI: https://doi.org/10.1007/978-981-13-1274-8_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1273-1
Online ISBN: 978-981-13-1274-8
eBook Packages: EngineeringEngineering (R0)