An overview of the application and development of data integrity verification techniques
Citations Over TimeTop 20% of 2023 papers
Abstract
With the development of computer technology to date, there is a large amount of data to be transmitted, processed, analyzed and stored, so the issue of data security is a very important aspect. Data integrity verification is an important part of operating system security or cloud server security, data integrity is the property that data has not been tampered with, damaged or lost during transmission and storage, data integrity that is compromised may result in data integrity, if compromised, can lead to data unavailability, which can lead to larger security issues. Therefore, to ensure the security of an operating system or cloud server, effective techniques and methods must be adopted in the operating system to protect data integrity. There are various data integrity verification techniques available, such as digital signature algorithms (DSA), Merkle hash tree and blockchain-based decentralization data storage and verification techniques. In this paper, current data integrity verification techniques are analyzed and presented.
Related Papers
- → Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain(2023)31 cited
- → Structural signatures for tree data structures(2008)71 cited
- Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data(2015)
- → HARE: A new Hash-based Authenticated Reliable and Efficient Modified Merkle Tree Data Structure to Ensure Integrity of Data in the Healthcare Systems(2021)20 cited
- → Ensuring Dynamic Data Integrity with Public Auditability for Cloud Storage(2012)9 cited