data integrity verification

data integrity verification

The process of manually supervising data verification for internal consistency.
References in periodicals archive ?
In order to check the performance of data integrity verification, four metrics are considered, which are security, storage overhead, communication overhead, and computational cost.
[4] proposed POR model to construct data integrity verification. The scheme ensures data integrity and retrievability through spot-checking and error-correcting codes.
Aiming to alleviate users' computation and communication burden during data integrity verification, trusted third party auditor (TPA) was introduced to help users perform data integrity checking [11, 12].
SecureBridge protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification. SecureBridge components can be used in conjunction with data access components to prevent data interception or modification in an untrusted network.
To solve this problem, [6] presented a data integrity verification scheme based on the RSA algorithm.
Combined with real-time data integrity verification, such as OCR reading, bar-code verification and database matching, the Axode 1080NEO provides quality inspection for printers and finishers of security documents, transactional documents and security labels.
Data security is through an always-on technology with industry standard 128-bit AES encryption, a unique encryption key for each message, data integrity verification and device authentication.
This requires the solution to provide auditing features, data integrity verification and guaranteed delivery options.
Therefore, we need to improve the efficiency of the data integrity verification and this can be gained via the energy scalable universal hash function [13] and speculative caching.
Traditional data integrity verification solutions [3, 4], which are based on hash functions and digital signatures, are impractical to audit cloud data remotely due to their unacceptable communication and computational overhead to retrieve the outsourced files.
Aspera s comprehensive security protects clients sensitive documents with SSH authentication, AES-128 data encryption in transit and at rest, and data integrity verification for each transmitted block.
Full browser ?