Cloud service provides access to servers, databases, storage, and any application services over the Internet. Cloud computing allows users to store their data in the servers. This will ease user to access the data everywhere by only using the internet connection from any devices. Cloud service allows users to run application to many mobile users or to support business critical operations. Cloud service also provides rapid access to the flexible and low-cost IT resources. By using the cloud service technology, there is no need to invest a hardware and spent much time to manage that hardware. Although cloud technology has many advantages, there are also some disadvantages such as some security issues. The usage of internet connection gives a high risk in cyber-attacks. Sometimes the cloud service provider also misuses the data stored in the server. This paper proposes the integrity verification of data stored in the server by using Hash function SHA-256 and AES-256. The proposed scheme combines the mechanism of encryption as a strategy to verify the data integrity. This method will encrypt files stored in the servers that aims to ensure the integrity of file stored. This research is expected to help use to secure their data.
Read full abstract