Skip to main content
Taylor & Francis Group Logo
Advanced Search

Click here to search books using title name,author name and keywords.

  • Login
  • Hi, User  
    • Your Account
    • Logout
Advanced Search

Click here to search books using title name,author name and keywords.

Breadcrumbs Section. Click here to navigate to respective pages.

Chapter

Trust Models for Data Integrity and Data Shredding in Cloud

Chapter

Trust Models for Data Integrity and Data Shredding in Cloud

DOI link for Trust Models for Data Integrity and Data Shredding in Cloud

Trust Models for Data Integrity and Data Shredding in Cloud book

Trust Models for Data Integrity and Data Shredding in Cloud

DOI link for Trust Models for Data Integrity and Data Shredding in Cloud

Trust Models for Data Integrity and Data Shredding in Cloud book

ByAshutosh Saxena, Nitin Singh Chauhan, Sravan Rondla
BookManaging Trust in Cyberspace

Click here to navigate to parent product.

Edition 1st Edition
First Published 2013
Imprint Chapman and Hall/CRC
Pages 22
eBook ISBN 9780429099281

ABSTRACT

Introduction ...........................................................................................................72 Cloud Storage: Present Scenario .................................................................... 73

Trust and Security Issues in Cloud ..................................................................... 73 Condentiality Issues ...................................................................................... 74 Integrity Issues .................................................................................................. 74 Issues of Availability ........................................................................................ 75 Privacy Issues ....................................................................................................75 Compliance, Audit, and Legal Issues ............................................................ 76 Data Ownership ............................................................................................... 76

Data Integrity Proofs ............................................................................................77 Integrity Issues with Remote Data Storage ..................................................77 Security and Performance Concerns ............................................................. 78 Popular Data Integrity Proofs ........................................................................ 79

Keyed-Hash Approach ............................................................................... 79 The Sentinel-Based Approach ....................................................................80 Provable Data Possession ........................................................................... 81 Third-Party Data Auditing ......................................................................... 82

Challenges and Future Developments ..........................................................83 Data Shredding ......................................................................................................84

T&F logoTaylor & Francis Group logo
  • Policies
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
  • Journals
    • Taylor & Francis Online
    • CogentOA
    • Taylor & Francis Online
    • CogentOA
  • Corporate
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
  • Help & Contact
    • Students/Researchers
    • Librarians/Institutions
    • Students/Researchers
    • Librarians/Institutions
  • Connect with us

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2021 Informa UK Limited