Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/327861
Title: | A Framework for Data Integrity Checking In Cloud Computing |
Researcher: | Garg, Neenu |
Guide(s): | Bawa, Seema |
Keywords: | Cloud computing Data integrity audit Third party audit |
University: | Thapar Institute of Engineering and Technology |
Completed Date: | 2017 |
Abstract: | Cloud computing has emerged as a utility computing paradigm that offers great potential for storing data remotely. It efficiently reduces data maintenance pressures of an organization. However, preserving data integrity and resolving security concerns of outsourced data still remains to be a challenge for data owners, due to loss of control over data. Thus, integrity checking of outsourced data in cloud computing environments becomes crucial for identifying loss of data or any corruption incident in timely manner. Data integrity checking significantly reduces the impact of risks caused due to such losses. In recent years, because of the growing trends of outsourcing data, significant progress has been made by researchers for designing efficient data integrity checking schemes. Most of the existing solutions have not been able to achieve the desired requirements of integrity checking schemes like public auditing of dynamic data, unlimited times of integrity checking and providing data freshness guarantees etc. Moreover, less attention had been given to minimize computation overhead incurred in integrity verification. Hence, new data integrity checking schemes for cloud computing are needed that fulfill the desired requirements and are computationally efficient Addressing the issue of integrity checking of outsourced data through literature survey, a comparative analysis of existing data integrity checking schemes is presented in the thesis. Detailed review of cryptographic and mathematical methods used to devise data integrity checking schemes has been carried out. A specific analysis based on security methods, storage overhead, computation cost and communication cost is presented in tabular form. Further, a comprehensive view of desirable properties of these schemes is presented. The challenges in the composition of an efficient data integrity checking scheme for cloud computing environment have been highlighted. |
Pagination: | 121p. |
URI: | http://hdl.handle.net/10603/327861 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 34.26 kB | Adobe PDF | View/Open |
02_certificate.pdf | 34.1 kB | Adobe PDF | View/Open | |
03_acknowledgements.pdf | 58.28 kB | Adobe PDF | View/Open | |
04_dedication.pdf | 47.77 kB | Adobe PDF | View/Open | |
05_abstract.pdf | 60.97 kB | Adobe PDF | View/Open | |
06_contents.pdf | 50.82 kB | Adobe PDF | View/Open | |
07_list of figures.pdf | 77.64 kB | Adobe PDF | View/Open | |
08_list of tables.pdf | 46.33 kB | Adobe PDF | View/Open | |
09_list of algorithms.pdf | 46.07 kB | Adobe PDF | View/Open | |
10_chapter 1.pdf | 103.64 kB | Adobe PDF | View/Open | |
11_chapter 2.pdf | 235.85 kB | Adobe PDF | View/Open | |
12_chapter 3.pdf | 200 kB | Adobe PDF | View/Open | |
13_chapter 4.pdf | 245.09 kB | Adobe PDF | View/Open | |
14_chapter 5.pdf | 144.26 kB | Adobe PDF | View/Open | |
15_chapter 6.pdf | 67.61 kB | Adobe PDF | View/Open | |
16_references.pdf | 110.38 kB | Adobe PDF | View/Open | |
17_list of publications.pdf | 46.44 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 100.98 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: