Vol. 2 No. 5 (2025): Issue Month: May, 2025
Review Article

Ensuring Data Integrity in Cloud Computing: A Review of Threats and Protection Strategies

Mrs. M. Sindhu
Department of Computer Science and Engineering, Sri Raaja Raajan College of Engineering and Technology, Karaikudi, Tamil Nadu, India.
Mrs. R. Divya
Department of Computer Science and Engineering, Moogambikai College of Engineering, Trichy, Tamil Nadu, India.

Published 2025-05-30

Keywords

  • Data Integrity,
  • Cloud Computing,
  • Attack,
  • IDS/IPS,
  • Security

How to Cite

Mrs. M. Sindhu, & Mrs. R. Divya. (2025). Ensuring Data Integrity in Cloud Computing: A Review of Threats and Protection Strategies. International Journal of Advanced Research and Interdisciplinary Scientific Endeavours, 2(5), 673–689. https://doi.org/10.61359/11.2206-2528

Abstract

Cloud computing has experienced significant growth in recent years, with many organizations transitioning from traditional computing models to cloud-based solutions due to their cost-effectiveness and scalability. While Cloud Service Providers (CSPs) assure data security and integrity, various challenges still persist, particularly concerning data integrity. In cloud environments, threats such as data theft, unavailability, and breaches pose significant risks. This paper presents a comprehensive review of existing studies on cloud data storage security, highlighting key integrity threats and vulnerabilities. Additionally, we provide an in-depth analysis of various data integrity attacks and explore effective mitigation techniques to enhance cloud security.