Abstract
The paper reviews few approaches on securely storing data in the cloud storage. Most of the cloud computing models aim towards ensuring that the data confidentiality and integrity prevails although users of the cloud use internet for using the services provided by the cloud computing system. The first mechanism considered involves checking that data integrity has been preserved or not through use of hash-function and metadata approach. The second mechanism involves making use of SHA-3 hash function to provide confidentiality as well as integrity for the data stored in cloud storage through use of the Mobile Cloud Computing (MCC) services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rao, C., Leelarani, M., Kumar, Y.R.: Cloud: computing services and deployment models. Int. J. Eng. Comput. Sci. 2, 3389–3392 (2013)
Nandgaonkar, S.V., Raut, A.B.: A comprehensive study on cloud computing. Int. J. Comput. Sci. Mob. Comput. 3(4), 733–738 (2014)
Neelima, M.L., Padma, M.: A study on cloud storage. Int. J. Comput. Sci. Mob. Comput. 3, 966–971 (2014)
Aldossary, S., Allen, W.: Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. 7, 485–498 (2016)
Al-Saiyd, N.A.: Nada Sail: data integrity in cloud computing security (2014)
Vyas, J., Modi, P.: Providing confidentiality and integrity on data stored in cloud storage by hash and meta-data approach. Int. J. Adv. Res. Eng. Sci. Technol. 4, 38–50 (2017)
Tikore, S.V.: Data integrity & confidentiality in cloud storage using hash function and TPA. Int. J. Recent Innov. Trends Comput. Commun. (IJRITCC) 3, 2738 (2015)
Babaeizadeh, M., Bakhtiari, M., Maarof, M.: KeyStroke dynamic authentication in mobile cloud computing (2014)
Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage (2012)
Aldossary, S., Allen, W.: Data security, privacy, availability and integrity in cloud computing: issues and current solutions (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Srivastav, N., Mathew, R. (2020). Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_62
Download citation
DOI: https://doi.org/10.1007/978-3-030-24643-3_62
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24642-6
Online ISBN: 978-3-030-24643-3
eBook Packages: EngineeringEngineering (R0)