CFP last date
20 January 2025
Reseach Article

File Integrity Maintenance Tool for Secure Information Storage in Cloud

by Shweta Sharma, Manoj Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 1
Year of Publication: 2014
Authors: Shweta Sharma, Manoj Kumar
10.5120/16970-6302

Shweta Sharma, Manoj Kumar . File Integrity Maintenance Tool for Secure Information Storage in Cloud. International Journal of Computer Applications. 97, 1 ( July 2014), 15-19. DOI=10.5120/16970-6302

@article{ 10.5120/16970-6302,
author = { Shweta Sharma, Manoj Kumar },
title = { File Integrity Maintenance Tool for Secure Information Storage in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 1 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number1/16970-6302/ },
doi = { 10.5120/16970-6302 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:22:58.302495+05:30
%A Shweta Sharma
%A Manoj Kumar
%T File Integrity Maintenance Tool for Secure Information Storage in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 1
%P 15-19
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In current scenario, modern technologies have completely changed the lives of the people. Every facility is available online through internet. People do their business through online services by being at home. This changing trend brought the concept of Cloud Computing where various physical servers(may be at different locations) are collaborated together and cloud services are provided to the users in the same fashion. When millions of people access business applications to perform their transactions, there arises a susceptibility for personal information security to get leaked through hackers/intruders etc. [1] [2] [3]. To avoid certain circumstances, data security becomes prime essential component as building block for the development of a safer and convenient system. The users require a prominent and secure portal. The risk levels get enhanced in case of access of highly confidential information through their accounts within the portal such as Banking websites, Defense or brokerage related applications. Safeguard of security through internet becomes streamlined concern for the service providers. A lot of research work has been pursued in order to ensure higher safety levels [4][5][6].

References
  1. G A Solanki: Welcome To the Future of Computing: Cloud Computing and Legal Issues: International Journal of scientific & technology research volume1, issue 9, October 2012.
  2. Nelson Gonzalez, CharlesMiers, FernandoRed´igolo1, and MarcosSimpl´icio: A quantitative analysis of current security concerns and solutions for cloud computing: Gonzalez et al. Journal of Cloud Computing: Advances, Systems and Applications2012,http://www. journalofcloudcomputing. com/content/1/1/11.
  3. S. Suganya, P. Damodharan: Enhancing Security for Storage Services in Cloud Computing: International Conference on Current Trends in Engineering and Technology, ICCTET'13.
  4. Ms. T. J. Salma: A Flexible Distributed Storage Integrity Auditing Mechanism in Cloud Computing: 2013 IEEE 14th International Conference on High Performance Switching and Routing.
  5. Bhavani Thuraisingham, Vaibhav Khadilkar, Anuj Gupta, Murat Kantarcioglu, Latifur Khan ,The University of Texas at Dallas: Secure Data Storage and Retrieval in the Cloud.
  6. Qingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying ZhangSecDM: Securing Data Migration Between Cloud Storage Systems :2011 IEEE ninth International conference on Dependable, autonomic and Secure computing.
  7. Zhongbin Tang, Xiaoling Wang, Li Jia, Xin Zhang, and Wenhui Man: Study on data security of cloud computing: IEEE.
  8. Hu glory Tianfield: Security Issues in Cloud Computing: 2012 IEEE International Conference on Systems, Man, and Cybernetics October 14-17, 2012, COEX, Seoul, Korea.
  9. Henry Kasim, Terence Hung, Xiaorong Li: Data Value Chain as a Service Framework: for Enabling Data Handling, Data Security and Data Analysis in the Cloud: 2012 IEEE 18th International Conference on Parallel and Distributed Systems
  10. Tina Francis, S. Vadivel: Cloud Computing Security: Concerns, Strategies and Best Practices: Proceedings of 20121ntemational of Cloud Computing, Technologies, Applications & Management 2012 IEEE.
  11. Mr. Prashant Rewagad, Ms. Yogita Pawar: Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing: 2013 International Conference on Communication Systems and Network Technologies.
  12. Mrs. G. Nalinipriya ME. , (Phd), Mr. R. Aswin Kumar: Extensive Medical Data Storage with Prominent Symmetric Algorithms On Cloud - A Protected Framework: 2013 International Conference on Smart Structures & Systems (JCSSS-20 13), March 28 - 29, 2013, Chennai, INDIA.
  13. A light Weight Centralized File Monitoring Approach for Securing Files in Cloud Environment : The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012)
  14. A secure and light weight approach for critical data security in cloud: 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).
  15. Forouzan, "Cryptography and Network Security", TMH.
Index Terms

Computer Science
Information Sciences

Keywords

Security Client-Server Integrity Maintenance Hash.