S. Spandana Reddy, P. Nethrasri


As contrary to previously mentioned authenticated organizations, e.g. skip list and Merkle tree, we devise an unusual authenticated network accepted as Homomorphic Authenticated Tree, we current further report nearby PoS and productive PoS. Whenever a verifier must verify the purity of the file, it indiscriminately selects some square indexes from the file, and transmits the to the perplex waiter. To the magnificent of our empathetic, no current lively Poss. supports this purpose. We advanced a peculiar tool admitted as HAT whatever is a superb authenticated network. We proposed the first-rate needs in multi-user distort storehouse organizations and on speaking terms the type of DE duplicatable changing Poss. Existing productive PoSs can't be drawn-out vis-à-vis the multi-user aura. Because of the complication of network diversification and tag period, extant organization can't be protracted to productive Poss. An operational multi-user distort depot structure needs the sure client-side mix-user deduplication approach, whichever enables everybody to skip the uploading alter and promote the effects from the files rapidly, when separate proprietors of the indistinguishable files have submitted the to the muddle hostess. to narrow the link cost both in the information of cache step and the deduplication step watches the same calculation cost. We demonstrate the safeness in our structure, and the logical search and preliminary results disclose that our structure is valuable used. Within this essay, we plan the idea of DE duplicatable productive information of storehouse and ask an adequate development common as Dipus, to realize progressive Pops and settle mix-user deduplication, concurrently.


Homomorphic Authenticated Tree (HAT); Cloud Storage; Dynamic Proof Of Storage; Deduplication;


A. Yun, J. H. Cheon, and Y. Kim, “On Homomorphic Signatures for Network Coding,” IEEE Transactions on Computers, vol. 59, no. 9, pp. 1295–1296, 2010.

Kun He, Jing Chen, Ruiying Du, Qianhong Wu, GuoliangXue, and Xiang Zhang, “DeyPoS: Deduplicatable Dynamic Proof ofStorage for Multi-User Environments”, IEEE Transactions on Computers, 2016.

K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A high-availability and integrity layer for cloud storage,” in Proc. of CCS, pp. 187–198, 2009.

Z. Ren, L. Wang, Q. Wang, and M. Xu, “Dynamic Proofs of Retrievability for Coded Cloud Storage Systems,” IEEE Transactions on Services Computing, vol. PP, no. 99, pp. 1–1, 2015.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proc. of CCS, pp. 491–500, 2011.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS, pp. 355–370, 2009.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS, pp. 598–609, 2007.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.