ENABLING DATA INTEGRITY PROTECTION IN CLOUD STORAGE USING CRYPTOGRAPHY

  • Unique Paper ID: 144235
  • PageNo: 10-15
  • Abstract:
  • Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Cloud computing promises several attractive benefits for businesses and end users. From users’ perspective, including both individuals and enterprises, storing data remotely into the cloud in a flexible on-demand manner brings appealing benefits: relief of the burden for storage management, universal data access with the independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc. Cryptography is one of the most important security technologies which used to secure the data transmission and the data itself. As the time and challenge growth, the cryptography also grows up with variety of encryption techniques and algorithms. It protects against unauthorized parties by preventing unauthorized alteration of use. It uses a cryptographic system to transform a plaintext into a cipher text, using most of the time a key. Crypto cloud computing is a new secure cloud computing architecture. It can provide protection of information security at the system level, and allows users access to share services conveniently and accurately. In the crypto cloud computing system, each entity encrypts data using their own private key. While fulfilling their own functions of information exchange and processing, all these elements will use the public key and private key to perform authentication first. In this way, crypto cloud system guarantees the security and credibility of information exchange.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{144235,
        author = {B. Meena Preethi and A.C.Sountharraj and S. Aishwarya and R. Rajeshwari},
        title = {ENABLING DATA INTEGRITY PROTECTION IN CLOUD STORAGE USING CRYPTOGRAPHY},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {9},
        pages = {10-15},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144235},
        abstract = {Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Cloud computing promises several attractive benefits for businesses and end users. From users’ perspective, including both individuals and enterprises, storing data remotely into the cloud in a flexible on-demand manner brings appealing benefits: relief of the burden for storage management, universal data access with the independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc. Cryptography is one of the most important security technologies which used to secure the data transmission and the data itself. As the time and challenge growth, the cryptography also grows up with variety of encryption techniques and algorithms. It protects against unauthorized parties by preventing unauthorized alteration of use. It uses a cryptographic system to transform a plaintext into a cipher text, using most of the time a key. Crypto cloud computing is a new secure cloud computing architecture. It can provide protection of information security at the system level, and allows users access to share services conveniently and accurately. In the crypto cloud computing system, each entity encrypts data using their own private key. While fulfilling their own functions of information exchange and processing, all these elements will use the public key and private key to perform authentication first. In this way, crypto cloud system guarantees the security and credibility of information exchange.},
        keywords = {Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS)},
        month = {},
        }

Cite This Article

Preethi, B. M., & A.C.Sountharraj, , & Aishwarya, S., & Rajeshwari, R. (). ENABLING DATA INTEGRITY PROTECTION IN CLOUD STORAGE USING CRYPTOGRAPHY. International Journal of Innovative Research in Technology (IJIRT), 3(9), 10–15.

Related Articles