CFP last date
20 March 2024
Reseach Article

Protective Auditing and Deduplicating Data in Cloud

by Munde Sadashiv C., B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 148 - Number 10
Year of Publication: 2016
Authors: Munde Sadashiv C., B. M. Patil
10.5120/ijca2016911276

Munde Sadashiv C., B. M. Patil . Protective Auditing and Deduplicating Data in Cloud. International Journal of Computer Applications. 148, 10 ( Aug 2016), 35-38. DOI=10.5120/ijca2016911276

@article{ 10.5120/ijca2016911276,
author = { Munde Sadashiv C., B. M. Patil },
title = { Protective Auditing and Deduplicating Data in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 148 },
number = { 10 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 35-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume148/number10/25795-2016911276/ },
doi = { 10.5120/ijca2016911276 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:53:01.153345+05:30
%A Munde Sadashiv C.
%A B. M. Patil
%T Protective Auditing and Deduplicating Data in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 148
%N 10
%P 35-38
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As the cloud computing becomes more popular for the virtually storing data because it provides the big storage space as well as provides the portability and mobility functions. Whenever we are moving around the world we can access the cloud data by setting up internet connection in between our device and cloud server. Cloud decreases the burden of storing and handling the huge data. External cloud storage raises the issues of reliability and security concerns. Some of the issues about deduplication and integrity auditing are in existing system. Major objective of this work is to acquire the data integrity and deduplication in order to keep our system secure as well as healthy. In previous work there is reduced the computation time of uploading and downloading time of data with the help of map reduce technique. As the customers requirement data is being more secure so here it use the encryption strategy for more security.

References
  1. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ser. ASIACRYPT ’08. Springer Berlin Heidelberg, 2008, pp.90–107.
  2. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Computer Security – ESORICS 2009, M. Backes and P. Ning, Eds.,vol. 5789. Springer Berlin Heidelberg, 2009, pp. 355–370.
  3. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Communication of the ACM, vol. 53, no. 4, pp.50–58, 2010.
  4. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 2011, pp. 491–500.
  5. G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, “Remote data checking using provable data possession,” ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34,2011.
  6. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231–2244, 2012.
  7. W. K. Ng, Y. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” in Proceedings of the 27th Annual ACM Symposium on Applied Computing, ser. SAC ’12. New York, NY, USA: ACM, 2012, pp. 441–446.
  8. J. Li, X. Tan, X. Chen, and D. Wong, “An efficient proof of retrievability with public auditing in cloud computing,” in 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013, pp. 93–98.
  9. S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proceedings of the 22Nd USENIX Conference on Security, ser. SEC’13. Washington, D.C.: USENIX Association, 2013, pp. 179–194. [Online]. Available: https://www.usenix.org/conference/usenixsecurity13/technicalsessions/ presentation/bellare
  10. J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” in IEEE Conference on Communications and Network Security (CNS), 2013, pp. 145–153.
  11. M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Advances in Cryptology – EUROCRYPT 2013, ser. Lecture Notes in Computer Science, T. Johansson and P. Nguyen, Eds. Springer Berlin Heidelberg, 2013, vol. 7881, pp. 296–312.
  12. T. Ristenpart, studied the detailed of “Message-locked encryption and secure deduplication,” Eds. Springer Berlin Heidelberg, 2013
  13. J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp.1615–1625, June 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Client Cloud Server and Auditor.