T. Anitha, G. Spandana


Outsourced data storage in cloud computing atmosphere needs huge data management and maintenance costs for that cloud servers, due to its growing demands in computing conditions.  In cloud storage servers, the customer system stores their data towards the cloud storage without acquiring a close copy.  The primary issue during this scenario should be to integrity auditing the information for security reasons on voiding data repetitions, due to the untreated huge outsourced data for that cloud servers. This paper will project and solve the issues for example voiding data repetitions and integrity auditing of understanding on cloud data storage, we offer two fundamental secure schemes to overcome the above mentioned pointed out stated issues in strongly related cloud computing atmosphere.  They are ConfCldEnv and ConfCldEnv.  The initial ConfCldEnv, will audit the integrity of clients produced data tags before uploading for the cloud, this course of action include Reduce Map cloud. Due to this plan of action, it heavily cuts lower round the computational costs of clients with the auditing and file uploading process. As well as the second ConfCldEnv  provides the designed request clients by triggers integrity auditing and secure voiding repetitions of understanding, when clients wants to secure their data before uploading data on cloud.


Integrity Auditing; Cloud Data Storage; Security; Confcldenv;


S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs ofownership in remote storage systems,” in Proceedings of the 18th ACMConference on Computer and Communications Security. ACM, 2011, pp. 491–500.

G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalableand efficient provable data possession,” in Proceedings ofthe 4thInternational Conference on Security and Privacy in CommunicationNetowrks, ser. SecureComm ’08. New York, NY, USA: ACM, 2008,pp. 9:1–9:10.

J. Yuan and S. Yu, “Secure and constant cost public cloud storageauditing with deduplication,” in IEEE Conference on Communicationsand Network Security (CNS), 2013, pp. 145–153.

S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraidedencryption for deduplicated storage,” in Proceedings of the22Nd USENIX Conference on Security, ser. SEC’13. Washington,D.C.: USENIX Association, 2013, pp. 179–194.

J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplicationwith efficient and reliable convergent key management,” IEEETransactions on Parallel and Distributed Systems, vol. 25, no. 6, pp.1615–1625, June 2014.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at