Table 1.
Limitations and compatibility issues of existing integrity schemes in Clouds.
Fig 1.
Black box architecture of provenance based data integrity verification.
Fig 2.
Collection of provenance data from different layers of abstraction in Clouds.
Table 2.
Various attributed with their description and corresponding layer of Cloud environment.
Fig 3.
Various components of integrity service (integrity tracker phase).
Fig 4.
Architecture of DataStore application with different layers of abstraction.
Fig 5.
Visualization of integrity leaks to the end user.
Table 3.
System details for evaluation.
Fig 6.
Results of the calculated time (minutes:seconds format) with and without the provenance for Eucalyptus Walrus.
Fig 7.
Cost of provenance collection in terms of elapsed time (in seconds) for different number of objects.
Fig 8.
Cost of provenance storage (disk space in Kilo bytes) for different number of objects.
Table 4.
Comparison of existing integrity schemes in Cloud.
Table 5.
Comparative analysis of proposed scheme with existing data integrity schemes.