+

Goswami et al., 2024 - Google Patents

Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

Goswami et al., 2024

View HTML @Full View
Document ID
7904247883559396890
Author
Goswami P
Faujdar N
Debnath S
Khan A
Singh G
Publication year
Publication venue
Journal of Cloud Computing

External Links

Snippet

Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performance, support, cost …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0775Content or structure details of the error report, e.g. specific table structure, specific error fields
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages

Similar Documents

Publication Publication Date Title
Goswami et al. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
Ganapathy A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications
Mahalakshmi et al. Public auditing scheme for integrity verification in distributed cloud storage system
Aguiar et al. An overview of issues and recent developments in cloud computing and storage security
Kiraz A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
Mishra et al. Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework
CN112037870B (en) Double-server light-weight searchable encryption method and system supporting data partitioning
Sood Mobile fog based secure cloud-IoT framework for enterprise multimedia security
Pericherla Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
Athena et al. Survey on public key cryptography scheme for securing data in cloud computing
Yu et al. Data security in cloud computing
Junghanns et al. Engineering of secure multi-cloud storage
Bandaru et al. Block chain enabled auditing with optimal multi‐key homomorphic encryption technique for public cloud computing environment
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
Zhu et al. Secure collaborative integrity verification for hybrid cloud environments
Kunal et al. Securing patient data in the healthcare industry: a blockchain-driven protocol with advanced encryption
Castiglione et al. A secure file sharing service for distributed computing environments
Bingu et al. A comprehensive review on security and privacy preservation in cloud environment
Wei et al. Dynamic data integrity auditing for secure outsourcing in the cloud
KC et al. Optimizing data retrieval for enhanced data integrity verification in cloud environments
Wang et al. Attribute‐Based User Revocable Data Integrity Audit for Internet‐of‐Things Devices in Cloud Storage
Neela DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract‐Based Access Control, and Hash Authentication Codes for Cloud Security
Zhang et al. A secure access control framework for cloud management
Bobde et al. An approach for securing data on Cloud using data slicing and cryptography
Krishnan et al. Securing Mass Distributed Big Data Storage using Intelligent Elliptic Curve Integrated Encryption Scheme in Multi-Cloud Computing
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载