Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{144235,
author = {B. Meena Preethi and A.C.Sountharraj and S. Aishwarya and R. Rajeshwari},
title = {ENABLING DATA INTEGRITY PROTECTION IN CLOUD STORAGE USING CRYPTOGRAPHY},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {3},
number = {9},
pages = {10-15},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=144235},
abstract = {Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Cloud computing promises several attractive benefits for businesses and end users. From users’ perspective, including both individuals and enterprises, storing data remotely into the cloud in a flexible on-demand manner brings appealing benefits: relief of the burden for storage management, universal data access with the independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc. Cryptography is one of the most important security technologies which used to secure the data transmission and the data itself. As the time and challenge growth, the cryptography also grows up with variety of encryption techniques and algorithms. It protects against unauthorized parties by preventing unauthorized alteration of use. It uses a cryptographic system to transform a plaintext into a cipher text, using most of the time a key. Crypto cloud computing is a new secure cloud computing architecture. It can provide protection of information security at the system level, and allows users access to share services conveniently and accurately. In the crypto cloud computing system, each entity encrypts data using their own private key. While fulfilling their own functions of information exchange and processing, all these elements will use the public key and private key to perform authentication first. In this way, crypto cloud system guarantees the security and credibility of information exchange.},
keywords = {Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS)},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry