Utkarsh Pandey, Chetan Agarwal, Bhavana Verma


The advent of technological upgradation day by day results in improvement in computing processes, increasing no. of user of computing over cloud for exchanging and sharing data, figures and details. Though even with lots of capable resources in processing there is also the safety barriers in cloud computing system for example data loss, malfunctioning, unwanted change in data, unauthorised access, data intruders barriers etc. thus prime focus on vital measures need to be made in order to overcome such security issues. In order to keep eye on working over cloud two model testing including integrity test on various information, detail files and authentication test on multiple file needs to be made to check out any correction, unauthorised change. In today’s era too the traditional factors are still noticed along with some hash function works on key basis. Although among various designs no one is completely relaxed from damages and attacks. Currently too no. of options available with are capable along with safety measures so that the data integrity is still maintained in outsourcing functions too. This paper provides a survey of the main research results of the previous studies.


Cloud Computing; Security; Privacy; Integrity Checking; Authentication

Full Text:



Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf, “ NIST Cloud Computing Reference Architecture” US Department of Commerce, Gaithersburg, MD, 2011.

P. Mell and T. Grance, “The nist definition of cloud computing, special publication 800-145,” US Department of Commerce, Gaithersburg, MD, 2011.

Bhaskar Prashad Rimal, Eunmi choi, Ian Lumb, “A Taxonomy and Survey of Cloud Computing System”, International Joint Conference on INC, IMS and IDC, IEEE, 2009.

Armbrust M, Fox A, Griffith R, Joseph D A, Katz H R, Konwinski A, Lee Gunho, Patterson A D, RabkinA, Stoica A, Zaharia M, “Above the clouds: A Berkeley view of Cloud Computing”, UC Berkeley, EECS, 2010.

Bhaskar Prasad Rimal, Admela Jukan, Dimitrios Katsaros, Yves Goeleven, “Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach”, Journal of Grid Computing, Springer, 2010.

Rajkumar Buyya, Karthik Sukumar, “Platforms for Building and Deploying Applications for Cloud Computing”, CSI Communications, 2011.

T. Rethika, I. Prathap, R. Anitha, and S. V. Raghavan, ”A novel approach to watermark text documents based on Eigen values,“ Proceedings of the Ninth International Conference on Network and Service Security (N2S’09), France, IEEE, pp.1-5, 2009.

H. T. Dinh, C. Lee, D. Niyato, and P. Wang, ”A survey of mobile cloud computing: architecture, applications, and approaches,“ Wireless Communications and Mobile Computing, John Wiley, vol. 13, no. 19, , pp. 1587-1611, Dec. 2012.

A. T. Velte, T. J. Velte, and R. Elsenpeter, Cloud Computing: A Practical Approach, McGraw-Hill Companies, 1st Edition, 2010.

J. Shen and K. Liu, ”A Novel Approach by Applying Image Authentication Technique on a Digital Document,“ Proceedings of International Symposium on Computer, Consumer and Control (IS3C), Taichung, Taiwan, pp. 119-122, June, 2014.

J. Qiu and P. Wang, ”An Image Encryption And Authentication Scheme,“ Proceedings of Seventh International Conf. on Computational Intelligence and Security (CIS), China, pp. 784-787,Dec, 2011.

N. Jamil and A. Aziz, ”A Unified Approach to Secure and Robust Hashing Scheme for Image and Video Authentication,“ Proceedings of 3rd IEEE International Congress on Image and Signal Processing (CISP), Yantai, China, Oct., pp. 274-278, 2010.

Z. Liu, H. S. Lallie, L. Liu, Y. Zhan, and K. Wu, ”A hash-based secure interface on plain connection,“ Proceedings of the sixth International Conference on Communications and Networking in China (ChinaCom’11), Harbin, China, pp. 1236-1239, IEEE, 2011.

N. Rabadi and S. Mahmud, ”Drivers anonymity with a short message length for vehicle-to-vehicle communications network,“Proceedings of the fifth IEEE Consumer Communications and Networking Conference (CCNC’08), Las Vegas, NV, USA, IEEE, pp. 132-133, Jan. 2008.

S. I. Naqvi and A. Akram, ”Pseudo-random key generation for secure HMAC-MD5,“ Proceedings of the 3rd IEEE International Conference on Communication Software and Networks (ICCSN), Xi’an, China, pp. 573-577, May, 2011.

C. Chaisri, N. Mettripun, and T. Amornraksa, ”Facsimile Authentication Based on MAC,“ IT Convergence and Services, Lecture Notes in Electrical Engineering, vol. 107, pp. 613-620, 2012.

K. Alla, G. G. Shankar, and G. B. Subrahmanyam, ”Secure Transmission of Authenticated Messages using New Encoding Scheme and Steganography,“ Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, Coimbatore UNK, India, pp. 749-752, 2012.

J. Song and S. Han, ”One-time key authentication protocol for PMIPv6,“Proceedings of the Third International Conference on Convergence and Hybrid Information Technology (ICCIT’08), South Korea, IEEE, pp. 1150-1153. 2008.

J. Y. Park, D. Lee and H. H. Lee, ”Data Protection in Mobile Agents; one-time key based approach“, Proceedings of the 5th International Symposium on Autonomous Decentralized Systems (ISADA’05), USA, IEEE, pp.411-418. 2001.

M. A. Ferrer, F. Vargas, A. Morales, and A. Ordonez, ”Robustness of offline signature verification based on gray level features,“ IEEE Trans. Inform. Forensics Security, vol. 7, no. 3, pp. 966-977, Jun. 2012.

P. Wayner, Disappearing Cryptography: Information Hiding: Steganography & Watermarking, Morgan Kaufmann, 3th Edition, 2009.

W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 6th Edition, 2013.

Zaid Ameen Abduljabbar, Hai Jin, Ali A.Yassin, Zaid Alaa Hussien, “Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing”, IEEE, 2016.

Solomon Guadie Worku, Chunxiang Xu, Jining Zhao, Xiaohu He, “Secure and efficient privacy-preserving public auditing scheme for cloud storage”, Computers and Electrical Engineering, Elsevier, 2013.

Cong Wang, Sherman S.M. Chow, Qian Wang, KuiRen, and Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage” IEEE Transactions on Computers, 2013.

G. Ateniese, R. B. Johns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598-609, 2007.

C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS􀀃09), Chicago, pp. 213-222, USA, 2009.

Q. Wang, C. Wang, K. Ren, W. Lou and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847 – 859, 2011.

DOI: https://doi.org/10.26483/ijarcs.v12i1.6683


  • There are currently no refbacks.

Copyright (c) 2021 International Journal of Advanced Research in Computer Science