2016
DOI: 10.5120/ijais2016451612
|View full text |Cite
|
Sign up to set email alerts
|

A Strongly Trusted Integrity Preservance based Security Framework for Critical Information Storage over Cloud Platform

Abstract: During last few years, the demand of cloud computing has immensely arisen among the Corporate/Business organizations. The cloud computing concept brings exclusive monetary benefits to the corporate houses through its pay-as per use facility. The incurred cost only lies in the consumption of hardware and software resources for any particular available business applications [1].For any particular project, all the web applications are deployed on available physical servers ,dispersed throughout the countries ,con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…However, the complexity of Cloud environment (in particular, auto-scaling, redundant systems, and load balancers) and the scale of generated logs bring more challenges for the storage, access, and verification of the logs. Sharma [103] points out the complexity of mega-scale Cloud environment and suggests incorporation of various cryptographic algorithms and digital signature to achieve high integrity for storing critical information in the Cloud. Liu et al [73] focus on the data storage integrity verification for Big Data in the areas of Cloud and Internet of Things (IoT), stating that data integrity is critical for any computation-related system.…”
Section: Log Tampering Prevention/detection Solutionsmentioning
confidence: 99%
“…However, the complexity of Cloud environment (in particular, auto-scaling, redundant systems, and load balancers) and the scale of generated logs bring more challenges for the storage, access, and verification of the logs. Sharma [103] points out the complexity of mega-scale Cloud environment and suggests incorporation of various cryptographic algorithms and digital signature to achieve high integrity for storing critical information in the Cloud. Liu et al [73] focus on the data storage integrity verification for Big Data in the areas of Cloud and Internet of Things (IoT), stating that data integrity is critical for any computation-related system.…”
Section: Log Tampering Prevention/detection Solutionsmentioning
confidence: 99%
“…However, the complexity of the Cloud environment and the scale of generated logs bring more challenges for the storage, access, and verification of the logs. Sharma [37] points out the complexity of a mega-scale Cloud environment and suggests incorporation of various cryptographic algorithms and digital signature to achieve high integrity for storing critical information in the Cloud. Liu et al [38] focus on the data storage integrity verification for Big Data in the areas of Cloud and Internet of Things (IoT), stating that data integrity is critical for any computation-related system.…”
Section: Cloud Logs and Related Challengesmentioning
confidence: 99%
“…However, the complexity of Cloud environment (in particular, redundant systems and load balancers) and the scale of generated logs bring more challenges for the storage, access, and verification of the logs. Sharma [15] points out the complexity of mega-scale Cloud environment and suggest incorporation of various cryptographic algorithms and digital signature to achieve high integrity for storing critical information in the Cloud. Liu et al [16] focus on the data storage integrity verification for Big Data in the areas of Cloud and IoT, stating that data integrity is critical for any computation-related system.…”
Section: Literature Reviewmentioning
confidence: 99%