2017
DOI: 10.1016/j.cose.2016.10.006
|View full text |Cite
|
Sign up to set email alerts
|

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 106 publications
(58 citation statements)
references
References 23 publications
0
45
0
2
Order By: Relevance
“…For limited resourced clients, the burden of computation and communication imposed by such protocol has to be as limited as possible which has lead to the idea of using protocols based on third parties auditors [141]. In [152], an in-depth review of remote data integrity checking protocol is presented with associated issues for their development and possible attacks they may face.…”
Section: Application Level Issuesmentioning
confidence: 99%
“…For limited resourced clients, the burden of computation and communication imposed by such protocol has to be as limited as possible which has lead to the idea of using protocols based on third parties auditors [141]. In [152], an in-depth review of remote data integrity checking protocol is presented with associated issues for their development and possible attacks they may face.…”
Section: Application Level Issuesmentioning
confidence: 99%
“…In fact, these systems require a set of well‐designed and tested security rules, and they pose many problems regarding data access controls mechanisms. One can cite the following: In cloud computing, data are stored in different locations at the same time. The data owner does not have full control over his resources.…”
Section: Introductionmentioning
confidence: 99%
“…Bulut depolamada veriler birden fazla sunucuda paylaştırıldığından, verilere erişim yetkisi kaybedilebilmekte ve kullanıcılara ait kredi kartı bilgileri veya şifreleri içeren dokümanların servis sağlayıcılar tarafından çalınma ihtimali bulunmaktadır. Bulut depolama şirketlerinin iflasa karşı koyamama ihtimalleri ve iç -dış ataklara karşı güvenlik açığı barındırma ihtimalleri, güvenilir bir yazılım veya donanım kullanılmaması ihtimalinden doğan güvensizlik durumu, kullanıcıların erişimden randıman alamama durumu ve yaşanabilecek kuralsızlıklara karşı adli bilişim sürecinin tam olarak işlememe ihtimali bulunmaktadır [11]. Ancak bulut depolama sistemleri içerdiği risk unsurlarının yanında kullanıcılara sağladığı faydalar dikkate alındığında kullanıcılar tarafından benimsenmekte ve ciddi oranlarda kullanılmaya devam edilmektedir.…”
Section: Gi̇ri̇ş (Introduction)unclassified