Data Integrity Techniques in Cloud Computing: An Analysis

Neha Thakur, Aman Kumar Sharma


Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.

Full Text:



Wei-Tek Tsai, Xin Sun and Janaka Balasooriya “Service-Oriented Cloud Computing Architecture”, 7th International Conference on Information Technology: New Generations (ITNG) 2010.

Sravan Kumar R and Saxena, “Data Integrity Proofs in Cloud Storage”, Third International conference on Communication Systems and Networks (COMSNETS), PP1-4, IEEE-2011.

G Ateniese, R D Pietro, L V Mancini, and G Tsudik, “Scalable and Efficient Provable Data Possession”, 4th International Conference on Security and Privacy in Communication Networks, SecureComm - Istanbul, Turkey, 2008.

Balachandra Reddy Kandukuri, Ramakrishna Paturi V and Dr. Atanu Rakshit, "Cloud Security Issues”, Proceedings IEEE International Conference on Services Computing, September 2009.

Mahesh S giri, Bhupesh Gaur and Deepak Tomar, “A Survey on Data Integrity Techniques in Cloud Computing”, International Journal of Computer Applications, Volume 122, No.2, July 2015.

G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores”, Proceedings of 14th ACM Conference on Computer and Communication Security, 2007.

S Ramgovind, M M Eloff, and E Smith, “The management of security in cloud computing”, Information Security for South Africa (ISSA), IEEE, PP1–7,2010.

C Erway, C Papamanthou, and R Tamassia, “Dynamic provable data possession” Proceedings of the 16th ACM conference on Computer and communications security, Berkeley, CA, USA, PP1–6, 2007.

R Sravan kumar and Saxena,”Data integrity proofs in cloud storage”, Third International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India 2011.

Chandran S and Angepat M, “Cloud Computing: Analyzing the risks involved in cloud computing environments,” in Proceedings of Natural Sciences and Engineering, Sweden, 2010.

Kevin D Bowers, Ari Juels, Alina Oprea, “Proofs of Retrievability: Theory and Implementation”, CCSW’09, in Proceedings of Journal of Systems and Software, May, 2012.

R Curtmola, O Khan, R Burns, and G Ateniese, “MR- PDP: Multiple-Replica Provable Data Possession,” in Proceedings of 28th IEEE ICDCS, 2008.

K D Bowers, A Juels, and A Oprea, “HAIL: A high availability and integrity layer for cloud storage”, in Proceedings of 16th ACM conference on Computer and communications security, 2009.

E Aguiar, Y Zhang and M Blanton, “An overview of issues and recent developments in cloud computing and storage security in high performance cloud auditing and applications”, Springer, PP3–33, 2014.

I Gul and M Islam, “Cloud computing security auditing”, International Conference on Next generation Information Technology (ICNIT), Gyeongju, Korea, PP143–148, 2011.

M A Shah, M Baker, J C Mogul, and R Swaminathan, “Auditing to keep online storage services honest”, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, 2007.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.