Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Content Auditing in the Cloud Environment


Affiliations
1 Department Computer Science, Minia University, Egypt
2 Department Computer Science, Cairo University, Egypt
     

   Subscribe/Renew Journal


Cloud computing is a new computing paradigm that enables organizations and users to store data in a highly available space of different shared applications and services, instead of storing and managing their data on the company's local server. There are some challenges that face cloud users when they use cloud storage services like inability of accessing their data physically, so if the user doesn't know the Cloud Service Provider (CSP), malicious activity on untrusted servers can alter or destroy their data and applications. As a conclusion content auditing, must be a requirement, a scheduled check for data is done as a correction purpose and this method is called data integrity. This paper proposed a model that provides content auditing of cloud user data which can be personal data or web pages by periodically checks data integrity by using keyed hashing algorithms and check trustiness of Cloud Service Provider, finally ensure the fast recovery of data.


Keywords

Auditing, Cloud Computing, Cloud Storage, Cloud Service Provider (CSP), Content Auditing, Data Integrity, Keyed Hashing Algorithms.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 271

PDF Views: 1




  • Content Auditing in the Cloud Environment

Abstract Views: 271  |  PDF Views: 1

Authors

R. Emad El-Dein
Department Computer Science, Minia University, Egypt
B. Youssef
Department Computer Science, Cairo University, Egypt
S. ElGamal
Department Computer Science, Cairo University, Egypt

Abstract


Cloud computing is a new computing paradigm that enables organizations and users to store data in a highly available space of different shared applications and services, instead of storing and managing their data on the company's local server. There are some challenges that face cloud users when they use cloud storage services like inability of accessing their data physically, so if the user doesn't know the Cloud Service Provider (CSP), malicious activity on untrusted servers can alter or destroy their data and applications. As a conclusion content auditing, must be a requirement, a scheduled check for data is done as a correction purpose and this method is called data integrity. This paper proposed a model that provides content auditing of cloud user data which can be personal data or web pages by periodically checks data integrity by using keyed hashing algorithms and check trustiness of Cloud Service Provider, finally ensure the fast recovery of data.


Keywords


Auditing, Cloud Computing, Cloud Storage, Cloud Service Provider (CSP), Content Auditing, Data Integrity, Keyed Hashing Algorithms.