Skip to main content

An Analysis of Cloud Computing Issues on Data Integrity, Privacy and Its Current Solutions

  • Conference paper
  • First Online:
Book cover Data Management, Analytics and Innovation

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 839))

Abstract

Cloud computing refers to data sharing, storing of data in cloud storage and sharing resources to the client. While considering data it should be securely protected from unauthorized access. Everything regarding the data security is a top threatening issues, in this paper we discuss about the data integrity issues of the cloud. How the server maintained the data without any loss or any damage using some encryption techniques. In this paper integrity checking is considered as an issue where some unauthorized person is accessing the data. Here the authorization of the data is checked by the data owner or a TPA—third party auditing using RSA and MD5 cryptographic algorithm. The data owner is responsible for giving access permission for the data which it may be public or private for integrity checking. Here the proposed system tells about how the third party auditing checks the integrity to avoid the overwhelming workload for the data owner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework (pp. 1–14).

    Google Scholar 

  2. Yu, Y., et al. (2017). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767–778.

    Article  Google Scholar 

  3. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.

    Article  MathSciNet  Google Scholar 

  4. Mahalakshmi, B., & Suseendran, G. (2016). Effectuation of secure authorized deduplication in hybrid cloud. Indian Journal of Science and Technology, 9(25).

    Google Scholar 

  5. Wang, B., Chow, S. S. M., Li, M., & Li, H. (2013). Storing shared data on the cloud via security-mediator. In Proceedings of International Conference on Distributed Computing Systems (pp. 124–133).

    Google Scholar 

  6. Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. 2012 International Conference on Computer Science and Electronics Engineering, 1(973), 647–651.

    Article  Google Scholar 

  7. Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485–498.

    Article  Google Scholar 

  8. Tate, S. R., & Mikler, A. R. (2003). Performance evaluation of data integrity Vandana Gunupudi thesis prepared for the Degree of Master of Science. December 2003 APPROVED.

    Google Scholar 

  9. Jayani, V. E. A., Ulasi, K. T., & Unitha, D. R. P. S. (2016). Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Transactions on Computers, 8(16), 3146–3152.

    Google Scholar 

  10. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.

    Article  Google Scholar 

  11. Kumar, S., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64, 12–22.

    Article  Google Scholar 

  12. Botta, A., De Donato, W., Persico, V., & Pescap, A. (2014). On the integration of cloud computing and internet of things.

    Google Scholar 

  13. Raghavendra, S., et al. (2016). Survey on data storage and retrieval techniques over encrypted cloud data. International Journal of Computer Science and Information Security, 14(9).

    Google Scholar 

  14. Fabian, B., Ermakova, T., & Junghanns, P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems, 48(May), 132–150.

    Article  Google Scholar 

  15. Yang, K., Member, S., Jia, X., & Member, S. (2012). An efficient and secure dynamic auditing protocol for data storage in cloud computing (pp. 1–11).

    Google Scholar 

  16. Liu, C., Yang, C., Zhang, X., & Chen, J. (2015). External integrity verification for outsourced big data in cloud and IoT: A big picture. Future Generation Computer Systems, 49(August 2014), 58–67.

    Google Scholar 

  17. Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2008). Scalable and efficient provable data possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks 2008 (p. 1).

    Google Scholar 

  18. Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: Taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369–392.

    Article  Google Scholar 

  19. Katkade, S., & Katti, J. V. (2017). Integrity check of shared data on cloud with various mechanisms. International Journal of Computer Applications, 159(6), 1–3.

    Google Scholar 

  20. Halevi, S., Harnik, D., Pinkas, B., & Haim, E. (2013). Proof of ownership in remote storage systems PoW solution : A general protocol security-efficiency tradeoff.

    Google Scholar 

  21. Wang, B., Li, B., & Li, H. (2015). Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Transactions on Services Computing, 8(1), 92–106.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Mahalakshmi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahalakshmi, B., Suseendran, G. (2019). An Analysis of Cloud Computing Issues on Data Integrity, Privacy and Its Current Solutions. In: Balas, V., Sharma, N., Chakrabarti, A. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-1274-8_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1274-8_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1273-1

  • Online ISBN: 978-981-13-1274-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics