Goswami et al., 2024 - Google Patents
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerabilityGoswami et al., 2024
View HTML- Document ID
- 7904247883559396890
- Author
- Goswami P
- Faujdar N
- Debnath S
- Khan A
- Singh G
- Publication year
- Publication venue
- Journal of Cloud Computing
External Links
Snippet
Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performance, support, cost …
- 238000003860 storage 0 title abstract description 142
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0775—Content or structure details of the error report, e.g. specific table structure, specific error fields
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Goswami et al. | Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability | |
| Ganapathy | A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications | |
| Mahalakshmi et al. | Public auditing scheme for integrity verification in distributed cloud storage system | |
| Aguiar et al. | An overview of issues and recent developments in cloud computing and storage security | |
| Kiraz | A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing | |
| Mishra et al. | Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework | |
| CN112037870B (en) | Double-server light-weight searchable encryption method and system supporting data partitioning | |
| Sood | Mobile fog based secure cloud-IoT framework for enterprise multimedia security | |
| Pericherla | Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. | |
| Athena et al. | Survey on public key cryptography scheme for securing data in cloud computing | |
| Yu et al. | Data security in cloud computing | |
| Junghanns et al. | Engineering of secure multi-cloud storage | |
| Bandaru et al. | Block chain enabled auditing with optimal multi‐key homomorphic encryption technique for public cloud computing environment | |
| Bakro et al. | Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms | |
| Zhu et al. | Secure collaborative integrity verification for hybrid cloud environments | |
| Kunal et al. | Securing patient data in the healthcare industry: a blockchain-driven protocol with advanced encryption | |
| Castiglione et al. | A secure file sharing service for distributed computing environments | |
| Bingu et al. | A comprehensive review on security and privacy preservation in cloud environment | |
| Wei et al. | Dynamic data integrity auditing for secure outsourcing in the cloud | |
| KC et al. | Optimizing data retrieval for enhanced data integrity verification in cloud environments | |
| Wang et al. | Attribute‐Based User Revocable Data Integrity Audit for Internet‐of‐Things Devices in Cloud Storage | |
| Neela | DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract‐Based Access Control, and Hash Authentication Codes for Cloud Security | |
| Zhang et al. | A secure access control framework for cloud management | |
| Bobde et al. | An approach for securing data on Cloud using data slicing and cryptography | |
| Krishnan et al. | Securing Mass Distributed Big Data Storage using Intelligent Elliptic Curve Integrated Encryption Scheme in Multi-Cloud Computing |