@incollection{, 2F4C16D13A50FC0457C466FC1ED089FF , author={{JasmeetSingh} and {RIMT-IET, Mandi Gobindgarh/ Punjab Techincal University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1313711 } @incollection{b0, , title={{A Scheme for Checking Data Correctness in the Cloud}} , author={{ MurugesanMalathi }} , booktitle={{International Conference on Information and Network Technology}} , note={ICINT 2012} } @incollection{b1, , title={{Improving data integrity on cloud storage services}} , author={{ .MMiss } and { Sowparnika1 } and { .RProf } and { Dheenadayalu2 }} , journal={{International Journal of Engineering Science Invention(ISSN)}} 2 2 , year={February. 2013} } @incollection{b2, , title={{A Protocol for Ensuring Data Integrity in Cloud Environment}} , author={{ NMadhuri } and { TVSuneetha } and { AHaritha } and { PV SLakshmi }} , journal={{International Journal of Advanced Research in Computer Science and Software Engineering}} 3 4 , year={April 2013} } @book{b3, , title={{Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing}} , author={{ Xu Chun-Xiang } and { DanielXiao-Hu } and { Abraha }} , year={2006} School of Computer Science and Engineering, University of Electronics Science and Technology of China } @incollection{b4, , title={{Data Auditing in Cloud Environment using Message Authentication Code}} , author={{ KGovinda } and { ESathiyamoorthy }} , booktitle={{International Conference on Emerging Trends on Advanced Engineering Research (ICETT)}} , year={2012} } @incollection{b5, , title={{Third Party Auditing for Secure Data Storage in Cloud through Digital Signature using RSA}} , author={{ KGovinda } and { VGurunathprasad } and { HSathishkumar }} , journal={{International Journal of Advanced Scientific and Technical Research}} 4 2 , year={August 2012} } @incollection{b6, , title={{Cloud Data Security while using Third Party Auditor}} , author={{ AbhishekMohta } and { LalitKumar Awasthi }} , journal={{International Journal of Scientific and Engineering Research}} 3 , year={June-2012} } @incollection{b7, , title={{Security Provision in Publicly Auditable Secure Cloud Data Storage Services using SHA-1 Algorithm}} , author={{ AkkalaSaibabu } and { TSatyanarayana } and { Murthy }} , journal={{International Journal of Computer Science and Information Technologies (IJCSIT)}} 3 3 , year={2012} } @incollection{b8, , title={{Survey on Data Integrity in Cloud Computing}} , author={{ Reenu Sara Georeg } and { SSabitha }} , journal={{International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)}} 2 1 , year={January 2013} } @incollection{b9, , title={{Achieving Secure Cloud Data Storage without using a Trusted Third Party Auditor-A Review}} , author={{ HirenPatel } and { DhirenPatel }} , journal={{International Journal of Computer Applications}} , year={Nov.2012} } @incollection{b10, , title={{A DATA INTEGRITY VERIFICATION IN CLOUD COMPUTING}} , author={{ SJeyadevan } and { .SDr } and { Patel }} , booktitle={{International Conference on Computing and Control Engineering}} , year={13 April,2012} 12 , note={ICCCE 2012} } @incollection{b11, , title={{Efficient integrity checking technique for securing client data in cloud computing}} , author={{ DaliaAttas } and { OmarBatrafi }} , journal={{International Journal of Electrical & Computer Sciences (IJECS-IJENS)}} 11 5 }