Data Integrity in Cloud Computing Security

Keesara Naveen Kumar, N. Srinivas

Abstract


Cloud computing requires comprehensive security solutions based upon many aspects of a large and loosely integrated system. The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Threats, vulnerabilities and risks for cloud computing are explained, and then, we have designed a cloud computing security development lifecycle model to achieve safety and enable the user to take advantage of this technology as much as possible of security and face the risks that may be exposed to data. A data integrity checking algorithm; which eliminates the third party auditing, is explained to protect static and dynamic data from unauthorized observation, modification, or interference.
Keyword: Cloud Computing; Cloud Computing Security; Data Integrity; Cloud Threads; Cloud Risks

Full Text:

PDF




Copyright (c) 2016 Keesara Naveen Kumar, N. Srinivas

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org