Data Integrity Checking Protocol with Data Dynamics in Cloud Computing
نویسندگان
چکیده
منابع مشابه
Data Integrity Checking Protocol with Data Dynamics in Cloud Computing
We introduce a model for provable data possession (PDP) which allows a client that has stored data at an un-trusted server to verify that the server possesses the original data without retrieving it. In a previous work, Ateniese et al. proposed a remote data integrity checking protocol that supports data partial dynamics. In this paper, we present a new remote data possession checking protocol ...
متن کاملRemote Data Integrity Checking in Cloud Computing
Cloud computing is an internet based computing which enables sharing of services. It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing our data in cloud may not be fully trustworthy. Since client doesn’t have copy of all stored data, he has to depend on Cloud Service Provider. This work studies the problem of ensuring the i...
متن کاملSurvey on Data Integrity Checking Protocols in Cloud Computing
Cloud computing is a internet based computing model that supports convenient ,on-demand and pay-for-use model. In this computing, data owners host their data on cloud servers and clients can access the data from cloud servers. Due to the data outsourcing, efficient verification of the outsourced data becomes a formidable challenge for data security in Cloud Computing (CC). Therefore, an indepen...
متن کاملEfficient Data Mining with Evolutionary Algorithms for Cloud Computing Application
With the rapid development of the internet, the amount of information and data which are produced, are extremely massive. Hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. Data mining can overcome this problem. While data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. As the speed of ...
متن کاملEnsuring Data Integrity in Cloud Computing
Cloud computing provides convenient on-demand network access to a shared pool of configurable computing resources. The resources can be rapidly deployed with great efficiency and minimal management overhead. Cloud is an insecure computing platform from the view point of the cloud users, the system must design mechanisms that not only protect sensitive information by enabling computations with e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communications, Network and System Sciences
سال: 2017
ISSN: 1913-3715,1913-3723
DOI: 10.4236/ijcns.2017.105b027