Ensuring Data Integrity in Cloud Computing: A Review of Threats and Protection Strategies

Authors

  • Mrs. M. Sindhu Department of Computer Science and Engineering, Sri Raaja Raajan College of Engineering and Technology, Karaikudi, Tamil Nadu, India.
  • Mrs. R. Divya Department of Computer Science and Engineering, Moogambikai College of Engineering, Trichy, Tamil Nadu, India.

DOI:

https://doi.org/10.61359/11.2206-2528

Keywords:

Data Integrity, Cloud Computing, Attack, IDS/IPS, Security

Abstract

Cloud computing has experienced significant growth in recent years, with many organizations transitioning from traditional computing models to cloud-based solutions due to their cost-effectiveness and scalability. While Cloud Service Providers (CSPs) assure data security and integrity, various challenges still persist, particularly concerning data integrity. In cloud environments, threats such as data theft, unavailability, and breaches pose significant risks. This paper presents a comprehensive review of existing studies on cloud data storage security, highlighting key integrity threats and vulnerabilities. Additionally, we provide an in-depth analysis of various data integrity attacks and explore effective mitigation techniques to enhance cloud security.

References

Downloads

Published

2025-05-30

How to Cite

Ensuring Data Integrity in Cloud Computing: A Review of Threats and Protection Strategies. (2025). International Journal of Advanced Research and Interdisciplinary Scientific Endeavours, 2(5), 673-689. https://doi.org/10.61359/11.2206-2528

Similar Articles

1-10 of 59

You may also start an advanced similarity search for this article.