Session
Computer Science and Information Systems
Description
The concept of cloud computing is currently being widely adopted by many business and organizations. Cloud Computing offers immense amount of resources, available for end users by employing various flexible paying methods. The opportunity to choose between several cloud providers is referred by complexity of integrated cloud computing solution. Cloud services offer many benefits to the data owner and users, but to take advantage of the benefits of cloud computing and to make the cloud viable as a computing platform, the data and the service hosted in the cloud must be fully secured. This research paper points out how third party auditors can be avoided and proposes a specific solution which involves the customer safeguarding the data integrity by himself in a very simple and efficient way by utilizing existing hash generating algorithm.
Keywords:
cloud, hash, data integrity, SaaS, PaaS, IaaS
Session Chair
Peter Kopacek
Session Co-Chair
Selman Haxhijaha
Proceedings Editor
Edmond Hajrizi
ISBN
978-9951-437-24-0
First Page
113
Last Page
118
Location
Durres, Albania
Start Date
2-11-2013 10:30 AM
End Date
2-11-2013 10:45 AM
DOI
10.33107/ubt-ic.2013.65
Recommended Citation
Haxhijaha, Selman; Bajrami, Gazmend; and Prekazi, Fisnik, "Data Integrity Check using Hash Functions in Cloud environment" (2013). UBT International Conference. 65.
https://knowledgecenter.ubt-uni.net/conference/2013/all-events/65
Included in
Data Integrity Check using Hash Functions in Cloud environment
Durres, Albania
The concept of cloud computing is currently being widely adopted by many business and organizations. Cloud Computing offers immense amount of resources, available for end users by employing various flexible paying methods. The opportunity to choose between several cloud providers is referred by complexity of integrated cloud computing solution. Cloud services offer many benefits to the data owner and users, but to take advantage of the benefits of cloud computing and to make the cloud viable as a computing platform, the data and the service hosted in the cloud must be fully secured. This research paper points out how third party auditors can be avoided and proposes a specific solution which involves the customer safeguarding the data integrity by himself in a very simple and efficient way by utilizing existing hash generating algorithm.