Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
Data Integrity Attacks in Cloud Computing: An Overview of Techniques for Identifying and Protecting
Author Name : Sahil Vinod Goliwar
ABSTRACT
The term "Cloud Computing" refers to a variety of services supplied through the internet, or "the cloud." Cloud Computing has become the fastest emerging technology in recent years. Many organizations are migrating to a cloud-based computing model due to its low cost and expect to be paid model. Even if the Cloud Service Provider makes sure the data is correct and securely saved on their Cloud Server, there are a number of Data Integrity issues that must be solved. The lack of data integrity in a cloud environment is a serious issue. In this paper, I've reviewed previous research that identifies difficulties related to Cloud Data Storage&Security, such as unavailability, a data breach of Cloud Server data, data theft and the available solutions to prevent or resolve the Attacks.
Keywords- Cloud Computing, Data Integrity,IDS/IPS, Security, Vulnerabilities.