Abstract

AbstractCloud computing can be used to access and storing data and delivery of different services over the internet. Using cloud storage, users can remotely store their data. Cloud service provider (CSP) provides data owners to store and access their valuable data in the cloud server and offers them to make use of on-demand data access without maintaining a local copy of their data. Even though this service avoids the data owners from making use of their third-party auditor, it certainly possesses serious security threats in maintaining the data owners cloud data. In addition, integrity is also an important issue in maintaining the data owners data stored in the cloud server. This survey presents an overview of integrity check and continuous auditing. The review work based on creating secure clouds by continuous auditing and cloud certification system (CCS) is used for high level security. This survey helps to provide the security by continuous auditing and overcome the integrity issues and to avoid the attacks by integrity checking algorithm and key validation mechanism. In this survey paper, various researchers’ ideas based on integrity checking and key schemes have been analyzed as literature review.KeywordsCloud computingThird-party auditorIntegrity checking algorithmUser IDKey validation mechanism

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call