Breadcrumbs Section. Click here to navigate to respective pages.
Chapter

Chapter
Trust Models for Data Integrity and Data Shredding in Cloud
DOI link for Trust Models for Data Integrity and Data Shredding in Cloud
Trust Models for Data Integrity and Data Shredding in Cloud book
Trust Models for Data Integrity and Data Shredding in Cloud
DOI link for Trust Models for Data Integrity and Data Shredding in Cloud
Trust Models for Data Integrity and Data Shredding in Cloud book
ABSTRACT
Introduction ...........................................................................................................72 Cloud Storage: Present Scenario .................................................................... 73
Trust and Security Issues in Cloud ..................................................................... 73 Condentiality Issues ...................................................................................... 74 Integrity Issues .................................................................................................. 74 Issues of Availability ........................................................................................ 75 Privacy Issues ....................................................................................................75 Compliance, Audit, and Legal Issues ............................................................ 76 Data Ownership ............................................................................................... 76
Data Integrity Proofs ............................................................................................77 Integrity Issues with Remote Data Storage ..................................................77 Security and Performance Concerns ............................................................. 78 Popular Data Integrity Proofs ........................................................................ 79
Keyed-Hash Approach ............................................................................... 79 The Sentinel-Based Approach ....................................................................80 Provable Data Possession ........................................................................... 81 Third-Party Data Auditing ......................................................................... 82
Challenges and Future Developments ..........................................................83 Data Shredding ......................................................................................................84