ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

DEDUPLICATION AND SECURITY ENHANCEMENT IN CLOUD COMPUTING

Journal: International Journal of Electrical Engineering and Technology (IJEET) (Vol.10, No. 6)

Publication Date:

Authors : ; ; ;

Page : 54-60

Keywords : Cloud storage system; regenerating codes; public audit; authenticator renewal; proxy; demonstrable secure.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Data de-duplication is one of the important data compression techniques for remove second copy copies of repeating information and has been extensively used in cloud storage to shrink the total of storage space and accumulate band with as a substitute of trust numerous data duplicate with the similar substance, de-duplication eliminates unnecessary data by trust only one physical copy and referring other superfluous data to that copy. To shield outsourced information in cloud system storage against version, adding up fault tolerance to cloud storage along with information honesty scrutiny and mal function reparation becomes important. Freshly, make codes have expanded excellence recognition to their minor restore information determine whereas given that fault tolerance. Existing distant examination strategies for regenerating-coded information only suggest non-public auditing, requiring information house owners to always keep on-line and finger auditing, as well as repairing, that is habitually not practical. Throughout this paper, we have a tendency to recommend a public auditing thesis for the regenerating-code-based cloud storage system. To determination the regeneration downside of weakness authenticators inside the absence of information house owners, we tend to introduce a proxy that is advantaged to redevelop the authenticators, into the typical public auditing system model. In addition, we tend to style a unique public demonstrable reviewer that is generated by some of keys and might be regenerated victimization partial keys. Thus, our idea will completely allow running free information house owners from on-line load. As well, we tend to randomize the code coefficients by means of a pseudorandom function to preserve information privacy.

Last modified: 2021-04-09 20:45:34