2019
DOI: 10.11591/ijeecs.v13.i2.pp626-633
|View full text |Cite
|
Sign up to set email alerts
|

Checking integrity of data and recovery in the cloud environment

Abstract: <p>Cloud computing provides many services to access them dynamically over the internet as per the user's demand. The data is growing in tremendous amount and it should be managed correctly where storage service proves efficient. The Data stored online can be hacked by the third party so to secure this data verifying integrity is essential. Because of the human error or natural disaster, the data may get deleted from the cloud servers. Therefore, there is a requirement of improving the existing algorithm … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 18 publications
(19 reference statements)
0
4
0
Order By: Relevance
“…The summary of findings as shown in Table 3. The summary of findings may be used as reference to various domains such as for cloud computing [10][11][12][13][14][15][16][17][18][19][20][21][22] and IoT [23 -25].…”
Section: Spearman's Rank Order Analysismentioning
confidence: 99%
“…The summary of findings as shown in Table 3. The summary of findings may be used as reference to various domains such as for cloud computing [10][11][12][13][14][15][16][17][18][19][20][21][22] and IoT [23 -25].…”
Section: Spearman's Rank Order Analysismentioning
confidence: 99%
“…Whereas the same key and the decryption algorithm are used by the receiver to decrypt the same message. While a public key is used by the sender using asymmetric key cryptography [4], [5]. But a private secret key is assigned to the receiver only [6].…”
Section: Introductionmentioning
confidence: 99%
“…The most common method for mobile application development using image processing machine learning technique is Mobile Cloud Computing (MCC). MCC is combination of mobiles and cloud computing which can simply processing from the user loca l devices to the data centre facilities over the internet [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24]. The major service providers of MCC are including Google, Amazon, Microsoft and Yahoo.…”
Section: Introductionmentioning
confidence: 99%