2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) 2017
DOI: 10.1109/wispnet.2017.8299880
|View full text |Cite
|
Sign up to set email alerts
|

A survey of security challenges in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…There could be various reasons that lead to a vulnerable situation towards data integrity over the cloud storage system. At present, there are various schemes of data integrity [4][5][6], but they suffer from i) lack of dynamic support, absolutely no preservation of privacy, zero codes of error correction for solving data corruption issue. Majority of the existing schemes of data integrity suffers from more number of problems, e.g., limited numbers of secret keys are utilized in the verification process, and so they are not applicable for large scale data.…”
Section: Introductionmentioning
confidence: 99%
“…There could be various reasons that lead to a vulnerable situation towards data integrity over the cloud storage system. At present, there are various schemes of data integrity [4][5][6], but they suffer from i) lack of dynamic support, absolutely no preservation of privacy, zero codes of error correction for solving data corruption issue. Majority of the existing schemes of data integrity suffers from more number of problems, e.g., limited numbers of secret keys are utilized in the verification process, and so they are not applicable for large scale data.…”
Section: Introductionmentioning
confidence: 99%