Session

Computer Science and Information Systems

Description

The concept of cloud computing is currently being widely adopted by many business and organizations. Cloud Computing offers immense amount of resources, available for end users by employing various flexible paying methods. The opportunity to choose between several cloud providers is referred by complexity of integrated cloud computing solution. Cloud services offer many benefits to the data owner and users, but to take advantage of the benefits of cloud computing and to make the cloud viable as a computing platform, the data and the service hosted in the cloud must be fully secured. This research paper points out how third party auditors can be avoided and proposes a specific solution which involves the customer safeguarding the data integrity by himself in a very simple and efficient way by utilizing existing hash generating algorithm.

Keywords:

cloud, hash, data integrity, SaaS, PaaS, IaaS

Session Chair

Peter Kopacek

Session Co-Chair

Selman Haxhijaha

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-437-24-0

First Page

113

Last Page

118

Location

Durres, Albania

Start Date

2-11-2013 10:30 AM

End Date

2-11-2013 10:45 AM

Share

COinS
 
Nov 2nd, 10:30 AM Nov 2nd, 10:45 AM

Data Integrity Check using Hash Functions in Cloud environment

Durres, Albania

The concept of cloud computing is currently being widely adopted by many business and organizations. Cloud Computing offers immense amount of resources, available for end users by employing various flexible paying methods. The opportunity to choose between several cloud providers is referred by complexity of integrated cloud computing solution. Cloud services offer many benefits to the data owner and users, but to take advantage of the benefits of cloud computing and to make the cloud viable as a computing platform, the data and the service hosted in the cloud must be fully secured. This research paper points out how third party auditors can be avoided and proposes a specific solution which involves the customer safeguarding the data integrity by himself in a very simple and efficient way by utilizing existing hash generating algorithm.