A DUPLICATE ACTIVE STORAGE INDEXES FOR MULTIPLE CLIENT ENVIRONMENTS
Abstract
As opposed to the present authenticated structures, for example skip list and Merkle tree, we design a singular authenticated structure known as Homomorphic Authenticated Tree, we present additional information about PoS and dynamic PoS. Whenever a verifier wants to determine the integrity of the file, it at random selects some block indexes from the file, and transmits these to the cloud server. To the very best of our understanding, no existing dynamic PoSs supports this method. We developed a novel tool known as HAT which is an excellent authenticated structure. We suggested the excellent needs in multi-user cloud storage systems and introduced the type of deduplicatable dynamic PoS. Existing dynamic PoSs can't be extended towards the multi-user atmosphere. Because of the problem of structure diversity and tag generation, existing system can't be extended to dynamic PoS. An operating multi-user cloud storage system needs the secure client-side mix-user deduplication technique, which enables a person to skip the uploading process and acquire the possession from the files immediately, when other proprietors of the identical files have submitted these to the cloud server. to lessen the communication cost both in the evidence of storage phase and also the deduplication phase concentrating on the same computation cost. We prove the safety in our construction, and also the theoretical analysis and experimental results reveal that our construction is efficient used. Within this paper, we introduce the idea of deduplicatable dynamic evidence of storage and propose a competent construction known as DeyPoS, to attain dynamic PoS and secure mix-user deduplication, concurrently.
Keywords
References
A. Yun, J. H. Cheon, and Y. Kim, “On Homomorphic Signatures for Network Coding,” IEEE Transactions on Computers, vol. 59, no. 9, pp. 1295–1296, 2010.
Kun He, Jing Chen, Ruiying Du, Qianhong Wu, GuoliangXue, and Xiang Zhang, “DeyPoS: Deduplicatable Dynamic Proof ofStorage for Multi-User Environments”, IEEE Transactions on Computers, 2016.
K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A high-availability and integrity layer for cloud storage,” in Proc. of CCS, pp. 187–198, 2009.
Z. Ren, L. Wang, Q. Wang, and M. Xu, “Dynamic Proofs of Retrievability for Coded Cloud Storage Systems,” IEEE Transactions on Services Computing, vol. PP, no. 99, pp. 1–1, 2015.
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proc. of CCS, pp. 491–500, 2011.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS, pp. 355–370, 2009.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS, pp. 598–609, 2007.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.