Cloud Computing: An Exploration on Data Integrity and Its TechniquesAuthor : R. K. Ramesh and K. L. Neela
Volume 8 No.1 January-March 2019 pp 44-49
In the recent years, the cloud computing moves a step forward by providing more services for the individual users and organizations. Each and every technology and systems can be easily integrated with cloud environment. In future lot of new technology will come to play their role. But to make the new technology fulfill their role they surely need a small part of cloud computing. The cloud plays a vital role in managing the data of different users. Users may be individual or organization and they use any cloud deployment model. Cloud provides low cost unpredictable and untraceable storage space to store user’s data. The main aim is to keep the data reliable, available, secure and sharable for the authorized users. But keeping the data secure is a big issue .In a public cloud any one can access the cloud easily. But the CSP or data owner has to prevent the unauthorized user’s access to the cloud. CSP can easily modify or delete the data which are not used by the user for a long time so as to get the storage space .The data integrity problem can be overcome by some different techniques which are proposed in various models .We can surely say that this cloud computing technology will become popular than any other technology.
CSP, Cloud Computing, Data Integrity, NIC, ALCOA, CCAF, BPMN, SEM, PKI, TTP
 Juels and Burton S. Kaliski, “PORs: Proofs of Retrievability for Large Files”, CCS ’07 Proceedings of the 14th ACM Conference on Computer and communications security, 978-159593-703-2,USA
 Bin feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu, (MEMBER, IEEE), and Tie Qiu, (SENIOR MEMBER, IEEE), “An Efficient Protocol with bidirectional verification for storage security in Cloud computing, special section on emerging trends, issues and challenges in energy-efficient cloud computing”, Digital Object Identifier 10.1109/access.2016. 2621005.
 Choon Beng Tan, Mohd Hanafi Ahmad Hijazi, Yuto Lim and Abdullah Gani, “A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issue”, Journal of Network and Computer Applications, pp. 75-86, 2018.
 [Online] Available: http://cryptowiki.net/index.php?title=Proof_of_ data_possession.
 Dimitrios Zissis, Dimitrios Lekkas, “Addressing cloud computing security issues”, Future Generation Computer Systems, pp. 583–592, 2012.
 Lu Rao, Tengfei Tu, Hua Zhang, Qiaoyan Wen, and Jia Xiao, dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security”, Wireless Communications and Mobile Computing, 2018.
 Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed,Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil, “A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends”, Computers and Security, pp. 29–49, 2017.
 Giuseppe Ateniese, Roberto Di Pietro and Luigi V. Mancini, “Scalable and Efficient Provable Data Possession”, in the Proceedings of the 4th international conference on Security and privacy in communication networks, Article No. 9 Istanbul, Turkey – September 22 – 25, 2008
 Gururaj Ramachandra, Mohsin Iftikhar and Farrukh Aslam Khan, “A Comprehensive Survey on Security in Cloud Computing”, The 3rd International Workshop on Cyber Security and Digital Investigation. [Online] Available: www.sciencedirect.com, Science Direct Procedia Computer Science, Vol. 110, pp.465–472, 2017.
 Hovav Shacham and Brent Waters, “Compact Proofs of Retrievability”, ASIACRYPT 2008, International Association for Cryptologic Research 2008, pp. 90–107, 2008.
 Jing Zou, Yunchuan Sun and Shixian Li, “Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree”, International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), 2016.
 Victor Chang, Yen-Hung Kuo, Muthu Ramachandran, “Cloud computing adoption framework: A security framework for business clouds”, in Future Generation Computer Systems, pp. 24–41, 2016
 Nesrine Kaaniche, Ethmane El Moustaine and Maryline Laurent, “A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications”, 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2014.
 [Online] Available: https://www.pharmout.net/data-integrity-alcoa/
 Salah H. Abbdal, Hai Jin, Deqing Zou and Ali A. Yassin, “Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing”, 7th International Conference on Security Technology, 2015.
 M. A. Shah, R. Swaminathan and M. Baker, “Privacy-preserving audit and extraction of digital contents”, Cryptology ePrint Archive, 2008.
 Yang Yang, Xianghan Zheng, Chunming Rong, Wenzhong Guo, “Efficient Regular Language Search for Secure Cloud Storage”, IEEE Transactions on Cloud Computing (Early Access), DOI: 10.1109/TCC.2018.2814594, 2018
 Y. Yu, M. Au, Ho. G. Ateniese, X. Huang, W. Susilo, Y. Dai, & G. Min, “Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage”, IEEE Transactions on Information Forensics and Security, pp. 767-778, 2017.
 Mazhar Ali Samee U. Khan, Athanasios V. Vasilakos, “Security in cloud computing: opportunities and challenges”, Information Sciences, pp. 357–383, 2015.
 B. Mahalakshmi and G. Suseendran, “Effectuation of Secure Authorized Deduplication in Hybrid Cloud”, Indian Journal of Science and Technology, 2016.
 B. Wang, S. S. M. Chow, M. Li and H. Li, “Storing shared data on the cloud via security-mediator”, In Proceedings of International Conference on Distributed Computing Systems, pp. 124–133, 2013 .
 D. Chen and H. Zhao, “Data security and privacy protection issues in cloud computing”, International Conference on Computer Science and Electronics Engineering, pp. 647–651, 2012.
 [Online] Available: https://www.fda.gov/ downloads/drugs/guidances/ ucm495891.