Integrity Verification Mechanisms Adopted in Cloud Environment
Shakti Arora1, Surjeet Dalal2
1Shakti Arora, Research Scholar, Department of Computer Science, SRM University, Sonepat (Haryana), India.
2Dr. Surjeet Dalal, Associate Professor, Department of Computer Science, SRM University, Sonepat (Haryana), India.
Manuscript received on 30 September 2019 | Revised Manuscript received on 12 November 2019 | Manuscript Published on 22 November 2019 | PP: 1713-1717 | Volume-8 Issue-6S3 September 2019 | Retrieval Number: F13210986S319/19©BEIESP | DOI: 10.35940/ijeat.F1321.0986S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Cloud computing has changed the shape of computing world. Now a-days users are not worried about the computational cost and infrastructure cost because of the maximum availability of all the resources are available on demand. The most widely used feature used by the users are storage as a service given by the cloud computing providers. Users can upload and access the data anywhere anytime time with the help of internet access. As with the usability of the storage as a service, is increasing the risk of security of the information are also increasing. Data security on the cloud is the prominent area for researchers and number of techniques and algorithms has been proposed to assure the integrity, consistency and data availability. In this paper a number of data auditing mechanism used by different cloud providers have been discussed and optimized integrity verification mechanism have been proposed to overcome the limitations of existing approaches. The communication overheads are compiled and calculated with different input data size. A comparative analysis is also prepared to justify the proposed approach.
Keywords: Cloud Environment Integrity Computing.
Scope of the Article: Cloud Computing