DEDUPLICATION AND SECURITY ENHANCEMENT IN CLOUD COMPUTING
Journal: International Journal of Electrical Engineering and Technology (IJEET) (Vol.10, No. 6)Publication Date: 2019-11-16
Authors : R.Naveenkumar; K.Muthusamy N.Arun Prasath; R.Krishnaraj;
Page : 54-60
Keywords : Cloud storage system; regenerating codes; public audit; authenticator renewal; proxy; demonstrable secure.;
Abstract
Data de-duplication is one of the important data compression techniques for remove second copy copies of repeating information and has been extensively used in cloud storage to shrink the total of storage space and accumulate band with as a substitute of trust numerous data duplicate with the similar substance, de-duplication eliminates unnecessary data by trust only one physical copy and referring other superfluous data to that copy. To shield outsourced information in cloud system storage against version, adding up fault tolerance to cloud storage along with information honesty scrutiny and mal function reparation becomes important. Freshly, make codes have expanded excellence recognition to their minor restore information determine whereas given that fault tolerance. Existing distant examination strategies for regenerating-coded information only suggest non-public auditing, requiring information house owners to always keep on-line and finger auditing, as well as repairing, that is habitually not practical. Throughout this paper, we have a tendency to recommend a public auditing thesis for the regenerating-code-based cloud storage system. To determination the regeneration downside of weakness authenticators inside the absence of information house owners, we tend to introduce a proxy that is advantaged to redevelop the authenticators, into the typical public auditing system model. In addition, we tend to style a unique public demonstrable reviewer that is generated by some of keys and might be regenerated victimization partial keys. Thus, our idea will completely allow running free information house owners from on-line load. As well, we tend to randomize the code coefficients by means of a pseudorandom function to preserve information privacy.
Other Latest Articles
- OPTIMIZED AND ENERGY EFFICIENT AUTHENTICATION SCHEME FOR SECURE HEALTHCARE SYSTEM IN BODY AREA NETWORK
- WIND ENERGY BASED MOVING ELECTRIC VEHICLE
- PERFORMANCE IMPROVEMENT OF WIRELESS SENSOR NETWORKS
- Study on Properties of Concrete using Rice Husk Ash and Fly Ash with Sisal Fiber as Partial Replacement of Fine Aggregate and Cement A Review
Last modified: 2021-04-09 20:45:34