Data Integrity Check in Cloud Computing using Hash Function

Main Article Content

Shephali Singh
Puneet Sharma
Dr. Deepak Arora

Abstract

Storage, server, networking, database and more are the services delivered by cloud computing over the internet. Cloud Computing is globally scaled that provides virtualization, scalability, fine grained data access control and performance benefit. Despite all this benefits, there are various issues of security and challenges for cloud. The challenges are that data is no longer in full control of owner, compromised cloud server and access control desired by owner. Customer needs a platform that stores its information and returns it without any changes or modification. Most of the cloud computing environment guarantees safety of data by various advancedencryptions. The information stored is encrypted at server side and is decrypted at client side. This makes data secure so that no third party can access or understand the data. The concern is unfaithful behaviour of the cloud itself. The data stored on cloud may be possible altered or modified without the knowledge of client.There should be a mechanism that verifies the stored and the data being retrieved is same. This paper investigates such mechanism.
This research paper points out how data integrity of information stored in cloud can be checked. In this technique after encryption of data, hash is created using hash function. At customer side after decrypting the data each hash is compared with other hash set to verify uniqueness of the data. This verifies is the data has been altered or it is same as the original data stored by the client.

Downloads

Download data is not yet available.

Article Details

Section
Articles

Most read articles by the same author(s)