{"title":"云中的数据完整性调查","authors":"K. N. Sevis, Ensar Seker","doi":"10.1109/CSCloud.2016.35","DOIUrl":null,"url":null,"abstract":"In recent years cloud computing is getting more and more attention every day. While outsourcing the hardware and software resources, still being able to manage them remotely with benefits like high computing power, competitiveness, cost efficiency, scalability, flexibility, accessibility and availability are revolutionary. For all of its advantages, on the other hand, nothing interesting is ever completely one-sided. Security and integrity of the data which is stored in untrustworthy server is critically important and raises concerns about it. The data can be modified, removed, corrupted or even stolen since it is in the remote server. These kinds of malicious activities can be done either by untrusted server or unauthorized user(s). Therefore, various integrity checking methods have been offered for cloud computing systems. This survey aims to analyze and compare different researches about data integrity proofs for these systems.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Survey on Data Integrity in Cloud\",\"authors\":\"K. N. Sevis, Ensar Seker\",\"doi\":\"10.1109/CSCloud.2016.35\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years cloud computing is getting more and more attention every day. While outsourcing the hardware and software resources, still being able to manage them remotely with benefits like high computing power, competitiveness, cost efficiency, scalability, flexibility, accessibility and availability are revolutionary. For all of its advantages, on the other hand, nothing interesting is ever completely one-sided. Security and integrity of the data which is stored in untrustworthy server is critically important and raises concerns about it. The data can be modified, removed, corrupted or even stolen since it is in the remote server. These kinds of malicious activities can be done either by untrusted server or unauthorized user(s). Therefore, various integrity checking methods have been offered for cloud computing systems. This survey aims to analyze and compare different researches about data integrity proofs for these systems.\",\"PeriodicalId\":410477,\"journal\":{\"name\":\"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCloud.2016.35\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCloud.2016.35","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In recent years cloud computing is getting more and more attention every day. While outsourcing the hardware and software resources, still being able to manage them remotely with benefits like high computing power, competitiveness, cost efficiency, scalability, flexibility, accessibility and availability are revolutionary. For all of its advantages, on the other hand, nothing interesting is ever completely one-sided. Security and integrity of the data which is stored in untrustworthy server is critically important and raises concerns about it. The data can be modified, removed, corrupted or even stolen since it is in the remote server. These kinds of malicious activities can be done either by untrusted server or unauthorized user(s). Therefore, various integrity checking methods have been offered for cloud computing systems. This survey aims to analyze and compare different researches about data integrity proofs for these systems.