1
|
Goswami P, Faujdar N, Debnath S, Khan A, Singh G. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. JOURNAL OF CLOUD COMPUTING 2024; 13:45. [DOI: 10.1186/s13677-024-00605-z] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/06/2023] [Accepted: 01/30/2024] [Indexed: 01/05/2025]
Abstract
AbstractCloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performance, support, cost, and reliability compared to traditional storage methods. However, despite the benefits of disaster recovery, scalability, and resource backup, some organizations still prefer traditional data storage over cloud storage due to concerns about data correctness and security. Data integrity is a critical issue in cloud computing, as data owners need to rely on third-party cloud storage providers to handle their data. To address this, researchers have been developing new algorithms for data integrity strategies in cloud storage to enhance security and ensure the accuracy of outsourced data. This article aims to highlight the security issues and possible attacks on cloud storage, as well as discussing the phases, characteristics, and classification of data integrity strategies. A comparative analysis of these strategies in the context of cloud storage is also presented. Furthermore, the overhead parameters of auditing system models in cloud computing are examined, considering the desired design goals. By understanding and addressing these factors, organizations can make informed decisions about their cloud storage solutions, taking into account both security and performance considerations.
Collapse
|
2
|
Prabhakaran V, Kulandasamy A. Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure data storage in the cloud. Comput Intell 2020. [DOI: 10.1111/coin.12408] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
Affiliation(s)
- Varun Prabhakaran
- School of Computing Sathyabama Institute of Science & Technology (Deemed to be University) Chennai India
| | - Ashokkumar Kulandasamy
- Department of Computer Science and Engineering Sathyabama Institute of Science & Technology (Deemed to be University) Chennai India
| |
Collapse
|