2017
DOI: 10.1371/journal.pone.0177576
|View full text |Cite
|
Sign up to set email alerts
|

Provenance based data integrity checking and verification in cloud environments

Abstract: Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user’s data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…They are correlated with each waveform data file stored on specific blocks on sever disk. In database level, MySQL table design includes entity integrity, referential integrity and domain integrity like signature validation to keep the data stability, maintainability and re-usability [30]. In the entire network layer, MP60 data processing protocol and MOXA commercially qualified embedded protocol guarantees the data transmission integrity [27], which keeps the network data flow run normally and precisely.…”
Section: Physiological Databasementioning
confidence: 99%
“…They are correlated with each waveform data file stored on specific blocks on sever disk. In database level, MySQL table design includes entity integrity, referential integrity and domain integrity like signature validation to keep the data stability, maintainability and re-usability [30]. In the entire network layer, MP60 data processing protocol and MOXA commercially qualified embedded protocol guarantees the data transmission integrity [27], which keeps the network data flow run normally and precisely.…”
Section: Physiological Databasementioning
confidence: 99%
“…A novel approach presented as Data Provenance in the cloud computing environment to track the occurrence of any violation of data integrity. 22 This approach was observed to reduce the components required for verifying the integrity of the data such as third-party services, supplementary hardware support and the imitation of data on client side. An efficient public auditing protocol with global and sampling block is proposed.…”
Section: Related Researchesmentioning
confidence: 99%
“…This approach was seen to provide an efficient method in maintaining the integrity of the data among the large files stored in the cloud. A novel approach presented as Data Provenance in the cloud computing environment to track the occurrence of any violation of data integrity . This approach was observed to reduce the components required for verifying the integrity of the data such as third‐party services, supplementary hardware support and the imitation of data on client side.…”
Section: Related Researchesmentioning
confidence: 99%
“…But all these techniques have some advantages and disadvantages that consider in the following survey. Muhammad Imran, Helmut Hlavacs, Inam Ul Haq, Bilal Jan, Fakhri Alam Khan,Awais Ahmad, proposed a scheme which check the integrity using provenance data and verification over cloud environment [15]. There must have a mechanism that check integrity of user data is violated or not.…”
Section: IImentioning
confidence: 99%