Joint Data Integrity and Loss Recovery Mechanism for Secure Storage in Cloud Computing


  • K. K. Baseer Associate Professor of CSE, GITAM School of Technology,GITAM (Deemed to be University),Bengaluru, Karnataka, India
  • M. Jahir Pasha Associate professor, Department of Computer Science and Engineering, G Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India
  • Subhashini R. Assistant professor, Department of Information Technology, Sona college of Technology, Salem
  • S. Srinivasan Professor, Department of Advanced Computing Sciences, AMET University, Chennai, Tamilnadu, India
  • Jyoti Prasad Patra Professor Head EE and EEE, Krupajal Engineering College, KEC Pubasasan Prasanthi Vihar Kausalyaganga Near CIFA District Puri Bhubaneswar, Odisha, India
  • V. Jagannatha Reddy Assistant Professor, Department of CSE, Gandhi Institute of Technology and Management (GITAM Deemed to be University) Bengaluru Campus, Doddaballapura, Karnataka, India


Data Integrity, Loss Recovery, Secure Storage, Cloud Computing, Machine Learning


Data outsourcing lowers the cost of maintenance and storage, but the user is unaware of the location of their data. Since cloud data is uncontrollable, new security issues must be addressed. Despite much research in the literature, there are still significant problems with secure storage and data integrity for shared dynamic data. Intending to solve these issues, this research develops a data security and integrity methodology that also allows for data loss recovery in the cloud using the efficiency of Machine Learning (ML) algorithms. When a cloud fails due to a disaster, an attack, or data loss and corruption, the data loss recovery process helps to recover the lost data and restore the cloud backup.


Download data is not yet available.


G. B. Tarekegn, G. Abadi Maru, and H. Zelalem Liyew, “Privacy and security issues IN cloud computing,” International Journal Of Current Research, vol. 8, no. 7, pp. 34894–34898, 2016.

A. Venkatesh and . M. S. Eastaff, "A Study of Data Storage Security Issues in Cloud Computing," International Journal of Scientific Research in Computer Science, Engineering and Information Technology , IJSRCSEIT , vol. Vol. 3, No. 1, pp. 2456-3307, 2018.

O. O. Olakanmi and A. Dada, “An efficient privacy-preserving approach for secure verifiable outsourced computing on untrusted platforms,” International Journal of Cloud Applications and Computing, vol. 9, no. 2, pp. 79–98, 2019.

S. Basu, A. Bardhan , K. Gupta , P. Saha, M. Pal and M. Bose , "Cloud computing security challenges & solutions - A survey," in IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018.

E. Alsolami, “Security threats and legal issues related to cloud based solutions,” IJCSNS International Journal Of Computer Science And Network Security, vol. 18, no. 5, 2018.

F. M. Awaysheh, M. N. Aladwan, M. Alazab, S. Alawadi, J. C. Cabaleiro, and T. F. Pena, “Security by design for big data frameworks over cloud computing,” IEEE Transactions On Engineering Management, vol. 99, 2021.

H. Yusuf and S. Selvan, "Confidentiality Issues in Cloud Computing and Countermeasures: A Survey," in National Conference On Emerging Computer Paradigms 2016, NMAMIT, Nitte, 2016.

Sadavarte, Rajesh and Kurundkar, Gajanan, "Data security and integrity in cloud computing : Threats and Solutions", International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 356-363, 2020.

Abdullatif Ghallab Saif, Mohammed and Mohsen Abdulqader, "Data Integrity and Security in Distributed Cloud Computing-A Review", Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, pp.767-784, 2021.

Ait, Almokhtar, Ammari Najim, Abou Anas, Ait Abdellah, and De Mina, "New mechanism for Cloud Computing Storage Security", International Journal of Advanced Computer Science and Applications, Vol. 7, No. 7, 2016.

Priteshkumar Prajapati, and Parth Shah, "A Review on Secure Data Deduplication: Cloud Storage Security Issue", Journal of King Saud University - Computer and Information Sciences, Vol. 34, No. 7, pp. 3996-4007, 2022.

N.K. Sehgal, P.C.P. Bhatt, and J.M. Acken, "Future trends in cloud computing", Cloud Computing with Security, pp. 235-259, 2020.

J. Hong, K. Xue, Y. Xue, W. Chen, D. S. L. Wei, N. Yu, and P. Hong, ‘‘TAFC: Time and attribute factors combined access control for time-sensitive data in public cloud,’’ IEEE Trans. Services Comput., vol. 13, No. 1, pp. 158–171, Jan. 2020.

P. Yang, N. Xiong,and J. Ren, "Data security and privacy protection for cloud storage: A survey", IEEE Access, Vol. 8, pp. 131723-131740, 2020.

E. Hesamifard, H. Takabi, M. Ghasemi, and N. W. Rebecca, ‘‘Privacy preserving machine learning as a service,’’ Proc. Privacy Enhancing Technol., vol. 2018, no. 3, pp. 123–142, Jun. 2018.

P. Li, T. Li, H. Ye, J. Li, X. Chen, and Y. Xiang, ‘‘Privacy-preserving machine learning with multiple data providers,’’ Future Gener. Comput. Syst., vol. 87, pp. 341–350, Oct. 2018.

Amr M. Sauber, Passent M. El-Kafrawy, Amr F. Shawish, Mohamed A. Amin, and Ismail M. Hagag, "A New Secure Model for Data Protection over Cloud Computing", Computational Intelligence and Neuroscience, vol. 2021, 2021.

Senthil Kumar, and Latha Parthiban, "Secure Data Storage In Cloud With Enhanced Public Verifiability And Data Loss Recovery", International Journal of Pure and Applied Mathematics, Vol. 119, No. 16, pp. 1979-1987, 2018.

Paul R Rejin, Raj D Paul, Amir H. Alavi, "Verification of data integrity and co-operative loss recovery for secure data storage in cloud computing", Cogent Engineering, Vol. 6, No. 1, 2019.

Rongzhi Wang, "Research on data security technology based on cloud storage", Procedia Engineering, Vol. 174, pp. 1340 – 1355, 2017.

Rose Adee and Haralambos Mouratidis, "A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography", Sensors, Vol. 22, 2022.

Ali Asghar Heidari, Seyedali Mirjalili, Hossam Faris, Ibrahim Aljarah, Majdi Mafarja, and Huiling Chen, "Harris hawks optimization: Algorithm and applications", Future Generation Computer Systems, Vol. 97, pp. 849-872, 2019.

Dr.V.Dheepa, and Ms.G.Prathima, "Replace Recovery Algorithm Approach In Recovering A Failure In Cloud Environment", Hindco journals, Available Online.

Rashmi Ramesh Rachh, Ananda Mohan P.V,and Anami B.S, “Efficient Implementations for AES Encryption and Decryption”, Circuits, Systems, and Signal Processing, Vol.31, pp.1765-1785, 2012.

Indumathi Saikumar, “DES- Data Encryption Standard”, International Research Journal of Engineering and Technology,Vol. 4 No.3, 2017.

Seyedali Mirjalili, Seyed Mohammad Mirjalili and Andrew Lewisa, "Grey Wolf Optimizer", Advances in Engineering Software, Vol. 69, pp 46-61, March 2014.

J. Kennedy and R. Eberhart, "Particle swarm optimization," Proceedings of ICNN'95 - International Conference on Neural Networks, vol.4, pp. 1942-1948, 1995.




How to Cite

Baseer, K. K. ., Pasha, M. J. ., R., S. ., Srinivasan, S. ., Patra , J. P. ., & Reddy, V. J. . (2023). Joint Data Integrity and Loss Recovery Mechanism for Secure Storage in Cloud Computing. International Journal of Intelligent Systems and Applications in Engineering, 12(2), 800–809. Retrieved from



Research Article

Most read articles by the same author(s)

1 2 > >>