Secure File Allocation in Cloud Storage Using Audit Services and Deduplication

Burlu Revathi, N.P. Patnayak.M

Abstract


Data de-duplication is a method of getting rid of duplicate copies of data and has typically been used in cloud storage to reduce the amount of data stored and transferred. However, despite the likelihood that a document is requested by a huge number of clients, there is only one copy of every file stored in the cloud. De-duplication framework hence improves storage use while lowering constant quality. Additionally, when clients outsource their sensitive data to the cloud, security for that data is put to the test. In order to address the aforementioned security issues, the main goal of this study is to codify the concept of an adequate reliable deduplication architecture. In this paper, new distributed deduplication frameworks with improved unwavering quality are provided, in which the data chunks are sent via various cloud servers. Cloud lessens the burden of storing and maintaining the enormous amounts of data. The issues of unwavering quality and security concerns are brought up by external cloud storage. Deduplication and integrity auditing problems are partially caused by the current framework. The main objective of this study is to achieve data integrity and deduplication in order to maintain the security and soundness of our system. With the aid of a guide lessen system, calculating times for data transferring and downloading were slashed in earlier work. Clients' private information is typically more safe, thus this uses encryption to increase security.


References


. Yan Zhua,b, Hongxin Huc, Gail-Joon Ahnc, Stephen S. Yauc ,“Efficient Audit Service Outsourcing For Data Integrity In Cloudsâ€,In The Journal of Systems and Software 85 (2012) .

. Wang.Q, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Audit Ability And Data Dynamics For Storage Security In Cloud Computingâ€, In IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.

. Cong Wang, Student Member, IEEE, Sherman S.M. Chow, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE, and Wenjing Lou, Member, IEEE, “PrivacyPreserving Public Auditing For Secure Cloud Storageâ€.

. Abhishek Mohta* ,Ravi Kant Sahu,Lalit Kumar Awasthi ,Dept. of CSE, NIT Hamirpur (H.P.) India,“Robust Data Security For Cloud While Using Third Partyauditorâ€

. Juels.A and J. Burton, S. Kaliski, “Pors: Proofs Of Retrievability For Large Filesâ€,In Proc. ACM Conf. Computer and Comm. Security (CCS’07), pp. 584-597, Oct. 2007.

. Ateniese.G, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data Possession At Untrusted Stores†,In Proc. 14th ACM Conf. Computer and Comm. Security (CCS’07), pp. 598-609, 2007.

. Jiawei Yuan, Shucheng Yu,“Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloudâ€,University of Arkansas at Little Rock ,USA.

. Ezhil Arasu.S, B.Gowri, S.Ananthi ,â€Privacy-Preserving Public Auditing In Cloud Using HMAC Algorithm “,In International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-1, March 2013 .

. Shingare Vidya Marshal ,â€Secure Audit Service by Using TPA for Data Integrity in Cloud Systemâ€,In International Journal of Innovative Technology and Exploring Engineering (IJITEE)ISSN: 2278-3075, Volume-3, Issue-4, September 2013.

. Jiawei Yuan,Shucheng Yu “Secure and Constant Cost Public Cloud Storage Auditing with Deduplicationâ€, University of Arkansas at Little Rock, USA.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â