DATA INTEGRITY CHECKING FOR SECURING CLOUD STORAGE USING MODIFIED BLOWFISH ALGORITHM
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101-116.
Desai, C. V., & Jethava, G. B. (2014). Survey on Data Integrity Checking Techniques in Cloud Data Storage. International Journal, 4(12).
Swapnali, and Sangita Chaudhari. "Third Party Public Auditing scheme for Cloud Storage." Procedia Computer Science 79 (2016): 69-76.
Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., & Chen, J. (2015). MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Transactions on Computers, 64(9), 2609-2622.
Goyal, Renuka, and Navjot Sidhu. "Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing." International Journal of Computer Science & Information Technologies 5 (2014).
Attas, Dalia, and Omar Batrafi. "Efficient integrity checking technique for securing client data in cloud computing." IJECS 8282.6105 (2011): 11.
Morghade, Rahul K., and Sonal Honale. "International Journal Of Engineering Sciences & Research Technology Data Storage Security in Cloud Computing Using Third Party Auditor (TPA)".
Han, Shuai, and Jianchuan Xing. "Ensuring data storage security through a novel third party auditor scheme in cloud computing." Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on. IEEE, 2011.
Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.
Jenifer, Ms A. Emily, and Ms S. Karthigaiveni. "New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms." International Journal of Applied Engineering Research 11.3 (2016): 1894-1899.
Wang, Cong, et al. "Privacy-preserving public auditing for secure cloud storage." IEEE transactions on computers 62.2 (2013): 362-375.
Ateniese, Giuseppe, et al. "Scalable and efficient provable data possession." Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, 2008.
Juels, Ari, and Burton S. Kaliski Jr. "PORs: Proofs of retrievability for large files." Proceedings of the 14th ACM conference on Computer and communications security. Acm, 2007.
Wang, Qian, et al. "Enabling public auditability and data dynamics for storage security in cloud computing." IEEE transactions on parallel and distributed systems 22.5 (2011): 847-859.
Zhang, Jianhong, and Qiaocui Dong. "Efficient ID-based public auditing for the outsourced data in cloud storage." Information Sciences 343 (2016): 1-14.
Liu, Chang, et al. "X" Future Generation Computer Systems 49 (2015): 58-67.
Sookhak, Mehdi, et al. "A review on remote data auditing in single cloud server: Taxonomy and open issues." Journal of Network and Computer Applications 43 (2014): 121-141.
Aurora, Tanjyot, and Parul Arora. "Blowfish Algorithm." International Journal of Computer Science and Communication Engineering IJCSCE Special issue on “Recent Advances in Engineering & Technology†NCRAET 3.4 (2013): 238-243.
Balakrishnan, S., et al. "Introducing effective third party auditing (tpa) for data storage security in cloud." International Journal of computer science and Technology 2.2 (2011): 397-400.