International Conference on Computing and information Technology 2013 |
Foundation of Computer Science USA |
IC2IT - Number 3 |
December 2013 |
Authors: P. Parvathi, T. Meyyappan |
b3a76f57-3068-411a-bc9a-50370d61d589 |
P. Parvathi, T. Meyyappan . Survey on Data Integrity Checking Protocols in Cloud Computing. International Conference on Computing and information Technology 2013. IC2IT, 3 (December 2013), 23-25.
Cloud computing is a internet based computing model that supports convenient ,on-demand and pay-for-use model. In this computing, data owners host their data on cloud servers and clients can access the data from cloud servers. Due to the data outsourcing, efficient verification of the outsourced data becomes a formidable challenge for data security in Cloud Computing (CC). Therefore, an independent auditing service is required to make sure that the data is correctly hosted in the Cloud. Several protocols are introduced for performing integrity in cloud storage. This paper focuses on the different integrity checking protocols to address the above issue. This paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations.