2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2018
DOI: 10.1109/icccnt.2018.8493963
|View full text |Cite
|
Sign up to set email alerts
|

Audit Cloud: Ensuring Data Integrity for Mobile Devices in Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…One is the lack of control over the confidentiality and integrity of the data and the other is that it is difficult to recover the data if the local copy is deleted [4][5][6]. In order to solve these problems, the researchers proposed that users can encrypt data before outsourcing and sending it to a remote cloud server [7][8][9]. People also think of improving the availability and recoverability of data by storing multiple copies of the original data.…”
Section: Introductionmentioning
confidence: 99%
“…One is the lack of control over the confidentiality and integrity of the data and the other is that it is difficult to recover the data if the local copy is deleted [4][5][6]. In order to solve these problems, the researchers proposed that users can encrypt data before outsourcing and sending it to a remote cloud server [7][8][9]. People also think of improving the availability and recoverability of data by storing multiple copies of the original data.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, C-CLOUD generates a cloud from resources Which are not part of any cloud infrastructure. Clients typically pay service fee monthly or annually [2]. Clients who subscribe to C-CLOUD can achieve a variety of benefits depending on their particular need and get revenue in return from the C-CLOUD [3].…”
Section: Introductionmentioning
confidence: 99%