Research Article
Citation: V.Hema, M.GanagaDurga,G.Yogeswari. "Effectual Data Integrity Checking Technique Based On Number Theory." International Journal of Computing Algorithm 4.1 (2015): 33-36. |
Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.
Keywords Cloud Computing, Data Integrity, Service Level Agreements, Cloud Archive, Third Party Auditor
- BibTex
- Reference
- XML
- JSON
- Dublin Core
- CSL
@article{Eff1587433, author = {V.Hema,M.GanagaDurga,G.Yogeswari}, title = {Effectual Data Integrity Checking Technique Based On Number Theory}, journal={International Journal of Computing Algorithm}, volume={4}, issue={1}, issn = {2278-2397}, year = {2015}, publisher = {Scholarly Citation Index Analytics-SCIA}
<?xml version='1.0' encoding='UTF-8'?> <record> <language>eng</language> <journalTitle>International Journal of Computing Algorithm</journalTitle> <eissn>2278-2397 </eissn> <publicationDate>2015</publicationDate> <volume>4</volume> <issue>1</issue> <startPage>33</startPage> <endPage>36</endPage> <documentType>article</documentType> <title language='eng'>Effectual Data Integrity Checking Technique Based On Number Theory</title> <authors> <author> <name>V.Hema</name> </author> </authors> <abstract language='eng'>Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.</abstract> <fullTextUrl format='pdf'>http://www.hindex.org/2015/p874.pdf</fullTextUrl> <keywords language='eng'> <keyword>Cloud Computing, Data Integrity, Service Level Agreements, Cloud Archive, Third Party Auditor</keyword> </keywords> </record>
{ "@context":"http://schema.org", "@type":"publication-article","identifier":"http://www.hindex.org/2015/article.php?page=874", "name":"Effectual Data Integrity Checking Technique Based On Number Theory", "author":[{"name":"V.Hema "}], "datePublished":"2015", "description":"Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.", "keywords":["Cloud Computing, Data Integrity, Service Level Agreements, Cloud Archive, Third Party Auditor"], "schemaVersion":"https://schema.org/version/3.3", "includedInDataCatalog":{ "@type":"DataCatalog", "name":"Scholarly Citation Index Analytics-SCIA", "url":"http://hindex.org"}, "publisher":{"@type":"Organization", "name":"Scientific Communications Research Academy" } }
<?xml version='1.0' encoding='utf-8'?> <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"> <dc:contributor>M.GanagaDurga</dc:contributor> <dc:contributor>G.Yogeswari</dc:contributor> <dc:contributor></dc:contributor> <dc:creator>V.Hema</dc:creator> <dc:date>2015</dc:date> <dc:description>Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.</dc:description> <dc:identifier>2015SCIA316F0874</dc:identifier> <dc:language>eng</dc:language> <dc:title>Effectual Data Integrity Checking Technique Based On Number Theory</dc:title> <dc:type>publication-article</dc:type> </oai_dc:dc>
{ "identifier": "2015SCIA316F0874", "abstract": "Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive.", "author": [ { "family": "V.Hema,M.GanagaDurga,G.Yogeswari" } ], "id": "874", "issued": { "date-parts": [ [ 2015 ] ] }, "language": "eng", "publisher": "Scholarly Citation Index Analytics-SCIA", "title": " Effectual Data Integrity Checking Technique Based On Number Theory", "type": "publication-article", "version": "3" }