2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT) 2013
DOI: 10.1109/iccpct.2013.6528889
|View full text |Cite
|
Sign up to set email alerts
|

Survey on various data integrity attacks in cloud environment and the solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Integrity monitoring of data is essential for avoiding data corruption and data crash in the data centers. In cloud computing the architectural design sometimes lead to the integrity issue [18]. Various mechanisms are adopted for preventing data integrity attacks on the cloud environment such as cooperative provable data possession (CPDP) which is the combination of hash indexing hierarchy and Homomorphism verifiable response [19], [20].…”
Section: Data Integritymentioning
confidence: 99%
“…Integrity monitoring of data is essential for avoiding data corruption and data crash in the data centers. In cloud computing the architectural design sometimes lead to the integrity issue [18]. Various mechanisms are adopted for preventing data integrity attacks on the cloud environment such as cooperative provable data possession (CPDP) which is the combination of hash indexing hierarchy and Homomorphism verifiable response [19], [20].…”
Section: Data Integritymentioning
confidence: 99%
“…The target can use diverse methods to intercept data sent by a malicious user. In an another survey paper entitled as, "Study of Cloud based ERP service for small and medium enterprises", author Rajeev Sharma and Bright Keshwani have confirmed significance of the several security issues faced by Cloud ERP, specially for small and medium scale industry [10] [14][15]. The security guidelines for Cloud ERP service, provided by SAP, have been clearly formed out.…”
Section: Related Background Stud(mentioning
confidence: 99%
“…Victims of a Distributed DoS attack may face attack from both end compromised network behaving as a zombie as well as from the master attacker. [14]. The eavesdropper act as a master component, he launches rigorous attacks on the victim, via a compromised distributed network which is again separated into different compromised layers of network .…”
Section: Four Dimensional Security and Vulnerabilitymentioning
confidence: 99%
See 2 more Smart Citations