2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering 2013
DOI: 10.1109/icprime.2013.6496459
|View full text |Cite
|
Sign up to set email alerts
|

Data integrity and data dynamics with secure storage service in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Cryptography: cryptography is a technique for constructing protocols that prevents the unauthorized users to access and read private messages of others. Modern cryptography includes major modules in information security such as data integrity, data confidentiality and authentication [14]. Cryptography also includes passwords, military communications, electronic commerce, ATM cards etc [10].…”
Section: Security Problems In Saasmentioning
confidence: 99%
“…Cryptography: cryptography is a technique for constructing protocols that prevents the unauthorized users to access and read private messages of others. Modern cryptography includes major modules in information security such as data integrity, data confidentiality and authentication [14]. Cryptography also includes passwords, military communications, electronic commerce, ATM cards etc [10].…”
Section: Security Problems In Saasmentioning
confidence: 99%
“…This approach is suitable for preserving data integrity when data is outsourced to the DBaaS providers and users get access on-demand high quality services without facing maintenance burden of local data storage. Additionally, (Nithiavathy 2013) proposed integrity auditing mechanism that utilizes distributed erasure-coded data for employing redundancy and homomorphic token. This technique allows third party auditors and users to audit their logs and events at Cloud storage using light weight communication protocol at less computation cost.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, cloud computing is still in its initial stage [1]. The lack of standards, the security and the interoperability issues hamper the growth of cloud computing [2,3]. Thus, the choice of clouds made by companies is usually based on the quality of services, but measuring the quality of cloud providers' approach to security is difficult because many cloud providers will not expose their infrastructure to customers.…”
Section: Introductionmentioning
confidence: 99%