Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Data Integrity and Compression in Cloud Computing

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Abhijit Choudhury, Bijoyeta Roy, Santanu Kumar Misra
10.5120/ijca2017914553

Abhijit Choudhury, Bijoyeta Roy and Santanu Kumar Misra. Data Integrity and Compression in Cloud Computing. International Journal of Computer Applications 168(13):14-19, June 2017. BibTeX

@article{10.5120/ijca2017914553,
	author = {Abhijit Choudhury and Bijoyeta Roy and Santanu Kumar Misra},
	title = {Data Integrity and Compression in Cloud Computing},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {13},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {14-19},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume168/number13/27943-2017914553},
	doi = {10.5120/ijca2017914553},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Cloud computing is an emerging internet based computing technology that uses internet and maintain the servers for data storage and other applications. Nowadays, cloud storage provides data owners to upload their files and delete the local copy of the data, which helps to reduce the maintenance process of data and here data are remotely stored which leads to less aware of security threads . Many auditing schemes and protocols are used for verifying the checking integrity of outsourced data without downloading option and data modification are done by several unauthorized users or malicious users. To solve the issues, propose an integrity checking approach for remote storing data and also propose a novel mechanism for compression data with integrity.

References

  1. Ali,M., Khan,S.U. and Vasilakos,A.V., Security in cloud computing: Opportunities and challenges, Information Sciences 305 (2015) 357–383.
  2. Ghaeb,J.A.,Smadi,M.A and Chebil,J., 2010. A high performance data integrity assurance based on the determinant technique. Future Generation Computer Systems, 27(5), pp.614-619.
  3. Premkumar,P and Dr. Shanthi,D.,An Efficient Dynamic Data Violation Checking Technique For Data Integrity Assurance In Cloud Computing, International Journal of Innovative Research in Science, Engineering and Technology, 2014.
  4. Quinlan,T.and Dorward, S., 2002, January. Venti: A New Approach to Archival Storage. In FAST (Vol. 2, pp. 89-101)
  5. Dinesh,C., Data Integrity and Dynamic Storage Way in Cloud Computing, IEEE 2010, Vol.2,pp 201-205.
  6. Upadhyay,A.,Balihalli,P.,Ivaturi.,S.andRao,S.,Deduplication and Compression Techniques in Cloud Design,IEEE 2012,Vol.4,pp 11-16.
  7. Nicolae,B., High Throughput Data Compression for Cloud Storage, Springer 2012.Vol.11,pp 48-54.
  8. Braden R, Borman D, Partridge C. Computing the Internet Checksum. Intenet Request For Comments RFC 1071. ISI, September. 1988.
  9. Yan,H.,Lu.H and Gao,Q., 2012.A BP-LZ78Compression Algorithm Based on BP Network. In Advances in Electronic Engineering, Communication and Management Vol. 2 (pp. 211-216). Springer Berlin Heidelberg.
  10. Suarjaya.I.M.A.D.,"A new algorithm for data compression optimization." arXiv preprint arXiv:1209.1045 (2012).
  11. Zhang, F., Li, Z., Wen, M. C., Jia, X., & Chen, C. (2011). Implementation and optimization of LZW compression algorithm based on bridge vibration data. Proceedings Engineering, 15, 1570-1574.
  12. Priyadharshini .B and Parvathi,P., Data integrity in cloud storage. In Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on (pp. 261-265). IEEE.
  13. Govinda.K and Kumar.Y, Storage Optimization in Cloud Environment using Compression Algorithm ,International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),2012.
  14. https://en.wikipedia.org/wiki/Secure_Hash_Algorithms
  15. https://en.wikipedia.org/wiki/Message_authentication_code

Keywords

Data integrity violations, Main cloud, Remote cloud.

Learn about the IJCA article correction policy and process
Dealing with any form of infringement.
‘Peer Review – A Critical Inquiry’ by David Shatz
Directly place requests for print/ hard copies of IJCA via Google Docs