Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment
نویسندگان
چکیده
منابع مشابه
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is a major concern in outsourcing. In particular, query integrity, which means that query results returned by the service provider are both correct and complete, must be assured. Previous work requires clients to manage d...
متن کاملBatch Auditing for Multiclient Data in Multicloud Storage
Cloud storage enables users to outsource their data to cloud servers and enjoy the on-demand high-quality services. However, this new paradigm also introduces many challenges due to the security and integrity threats toward user’ outsourced data. Recently, various remote integrity auditing methods have been proposed, but most of them can only serve for the single cloud environment or the indivi...
متن کاملApplication Performance Optimization in Multicloud Environment
Nowadays, cloud computing is one of the most used information technologies. It offers an infrastructure, a platform or a software as a service over the network to the huge number of remote users. Currently, this is a very promising and popular way in which they are offered. Cloud computing has a potential to change the using of information technologies. There are two main open problems in cloud...
متن کاملCo-creation and Co-innovation in a Collaborative Networked Environment
Leveraged by the advances in communication and information Technologies, producers and consumers are developing a new behavior. Together with the new emerging collaborative manifestations this behavior may directly impact the way products are developed. This powerful combination indicates that consumers will be involved in a very early stage in product development processes supporting even more...
متن کاملA Metadata Verification Scheme for Data Auditing in Cloud Environment
Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. The notion on verifying data for intactness is termed as data auditing and the process is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2017
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2017/2948025