CFP last date
20 May 2024
Reseach Article

Data Integrity and Compression in Cloud Computing

by Abhijit Choudhury, Bijoyeta Roy, Santanu Kumar Misra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 13
Year of Publication: 2017
Authors: Abhijit Choudhury, Bijoyeta Roy, Santanu Kumar Misra
10.5120/ijca2017914553

Abhijit Choudhury, Bijoyeta Roy, Santanu Kumar Misra . Data Integrity and Compression in Cloud Computing. International Journal of Computer Applications. 168, 13 ( Jun 2017), 14-19. DOI=10.5120/ijca2017914553

@article{ 10.5120/ijca2017914553,
author = { Abhijit Choudhury, Bijoyeta Roy, Santanu Kumar Misra },
title = { Data Integrity and Compression in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 13 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number13/27943-2017914553/ },
doi = { 10.5120/ijca2017914553 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:16:03.755272+05:30
%A Abhijit Choudhury
%A Bijoyeta Roy
%A Santanu Kumar Misra
%T Data Integrity and Compression in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 13
%P 14-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an emerging internet based computing technology that uses internet and maintain the servers for data storage and other applications. Nowadays, cloud storage provides data owners to upload their files and delete the local copy of the data, which helps to reduce the maintenance process of data and here data are remotely stored which leads to less aware of security threads . Many auditing schemes and protocols are used for verifying the checking integrity of outsourced data without downloading option and data modification are done by several unauthorized users or malicious users. To solve the issues, propose an integrity checking approach for remote storing data and also propose a novel mechanism for compression data with integrity.

References
  1. Ali,M., Khan,S.U. and Vasilakos,A.V., Security in cloud computing: Opportunities and challenges, Information Sciences 305 (2015) 357–383.
  2. Ghaeb,J.A.,Smadi,M.A and Chebil,J., 2010. A high performance data integrity assurance based on the determinant technique. Future Generation Computer Systems, 27(5), pp.614-619.
  3. Premkumar,P and Dr. Shanthi,D.,An Efficient Dynamic Data Violation Checking Technique For Data Integrity Assurance In Cloud Computing, International Journal of Innovative Research in Science, Engineering and Technology, 2014.
  4. Quinlan,T.and Dorward, S., 2002, January. Venti: A New Approach to Archival Storage. In FAST (Vol. 2, pp. 89-101)
  5. Dinesh,C., Data Integrity and Dynamic Storage Way in Cloud Computing, IEEE 2010, Vol.2,pp 201-205.
  6. Upadhyay,A.,Balihalli,P.,Ivaturi.,S.andRao,S.,Deduplication and Compression Techniques in Cloud Design,IEEE 2012,Vol.4,pp 11-16.
  7. Nicolae,B., High Throughput Data Compression for Cloud Storage, Springer 2012.Vol.11,pp 48-54.
  8. Braden R, Borman D, Partridge C. Computing the Internet Checksum. Intenet Request For Comments RFC 1071. ISI, September. 1988.
  9. Yan,H.,Lu.H and Gao,Q., 2012.A BP-LZ78Compression Algorithm Based on BP Network. In Advances in Electronic Engineering, Communication and Management Vol. 2 (pp. 211-216). Springer Berlin Heidelberg.
  10. Suarjaya.I.M.A.D.,"A new algorithm for data compression optimization." arXiv preprint arXiv:1209.1045 (2012).
  11. Zhang, F., Li, Z., Wen, M. C., Jia, X., & Chen, C. (2011). Implementation and optimization of LZW compression algorithm based on bridge vibration data. Proceedings Engineering, 15, 1570-1574.
  12. Priyadharshini .B and Parvathi,P., Data integrity in cloud storage. In Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on (pp. 261-265). IEEE.
  13. Govinda.K and Kumar.Y, Storage Optimization in Cloud Environment using Compression Algorithm ,International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),2012.
  14. https://en.wikipedia.org/wiki/Secure_Hash_Algorithms
  15. https://en.wikipedia.org/wiki/Message_authentication_code
Index Terms

Computer Science
Information Sciences

Keywords

Data integrity violations Main cloud Remote cloud.