THE IMPORTANCE OF DATA INTEGRITY VERIFICATION METHODS IN CLOUD COMPUTING SYSTEMS
Keywords:
data integrity, cloud computing, cryptographic methods, Infrastructure-as-a-Service (IaaS), MD5, SHA-256, Zero Trust Architecture (ZTA)Abstract
With the rapid expansion of cloud computing, ensuring data integrity has become a critical concern for organizations and individuals relying on cloud-based services. Despite trust in cloud providers, risks such as data modification, corruption, and unauthorized access remain prevalent. This paper explores essential data integrity verification methods, including cryptographic protection, third-party auditing, and blockchain-based approaches. Cryptographic hash functions like SHA-256 provide enhanced security by detecting unauthorized alterations, while Zero Trust Architecture (ZTA) principles enforce continuous verification of data authenticity. Additionally, third-party auditors play a crucial role in independently assessing data integrity, mitigating concerns about service provider reliability. Infrastructure-as-a-Service (IaaS) models pose further challenges, as users often lack direct control over security measures. However, implementing advanced techniques such as secret sharing and homomorphic encryption enhances privacy and data protection in cloud environments. Ensuring robust verification methods fosters user trust, encourages cloud adoption, and safeguards critical information from potential cyber threats. This study highlights the importance of integrating comprehensive data integrity mechanisms to maintain the accuracy, consistency, and reliability of cloud-stored data. By strengthening security frameworks, organizations can confidently leverage cloud computing while mitigating risks associated with data breaches and integrity violations.
References
Gehrmann, Christian, Morenius, Fredric, Paladi, Nicolae. "State of The Art and Hot Aspects in Cloud Data Storage Security" Swedish Institute of Computer Science, 2013.
Azorin-Lopez, Jorge, Bradley, David, Hehenberger, Peter, Milne, et al.. "Mechatronics & the cloud" University of Strathclyde Publishing, 2018.
Aslam, Mudassar, Björkman, Mats, Gehrmann, Christian, Rasmusson, et al.. "Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud" 2012.
Ben Haj Frej, Mohamed. "Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor" 2019.
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey. "Still Wrong Use of Pairings in Cryptography" 2016.
Paladi, Nicolae. "Trusted Computing and Secure Virtualization in Cloud Computing" 2012.
Attasena, Varunya, Darmont, Jérôme, Harbi, Nouria. "Secret Sharing for Cloud Data Security" 'Springer Science and Business Media LLC', 2017.
Garcia Martinez, Haryam. "EXPLORING SECURE METHODS FOR ENSURING DATA INTEGRITY: A THEORETICAL ANALYSIS OF CRYPTOGRAPHIC AND DETECTION TECHNIQUES" CSUSB ScholarWorks, 2024.
Mubeen, Muhammad. "Zero-Trust Architecture for Cloud-Based AI Chat Applications: Encryption, Access Control and Continuous AI-Driven Verification" 2024.
Adeola, Oluwtosin Joseph. "Strategies for Information Technology Managers to Mitigate Data Manipulation Challenges Within Healthcare Cloud" 'IUScholarWorks', 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Islom Gayibov

This work is licensed under a Creative Commons Attribution 4.0 International License.