Notice Board :

Call for Paper
Vol. 6 Issue 2

Submission Start Date:
Feb 01, 2019

Acceptence Notification Start:
Feb 10, 2019

Submission End:
Feb 15, 2019

Final MenuScript Due:
Feb 28, 2019

Publication Date:
March 01, 2019
                         Notice Board: Call for PaperVol. 6 Issue 2      Submission Start Date: Feb 01, 2019      Acceptence Notification Start: Feb 10, 2019      Submission End: Feb 15, 2019      Final MenuScript Due: Feb 28, 2019      Publication Date: March 01, 2019




Volume III Issue X

Author Name
Utkarsh Pandey, Prof. Anurag Jain
Year Of Publication
2016
Volume and Issue
Volume 3 Issue 10
Abstract
With the development of cloud computing, a large number of individuals and companies transfer their data and business to cloud computing. But the management of the data and services of the cloud may not be fully trustworthy. How to ensure the integrity of data stored in cloud attracts more and more attention. A number of data files authentication and integrity schemes have been conducted to recognize any modification in the exchange of data files between two entities within a cloud environment. Existing solutions are based on combining key-based hash function with traditional factors (steganography, smart-card, timestamp). However, none of the proposed schemes appear to be sufficiently designed as a secure scheme to prevent from attacks. In recent years, lots of efficient and safe solutions to ensure the outsourced data integrity are proposed. This paper provides a survey of the main research results of the previous studies.
PaperID
2016/IJTRM/10/2016/7131