Multiauditing Based Cloud Storage Using Dynamic Hash Table

Authors

  • Veena Mudhol R M.Tech. Student, Department of Information Science and Engineering, Dayananda sagar college of engineering, Bangalore, India Author
  • Chandrakala B M Assistant professor, Department of Information Science and Engineering, Dayananda sagar college of engineering, Bangalore, India Author

Keywords:

Public auditing, Cloud security, Data storage, Deduplication of data

Abstract

Cloud vault is one of the standard  supplication of distributed computing framework, which  offers on-request offloading administrations for the two  people and establishments. in spite of the fact that, utilizers  don't have full confidence on the cloud specialist co-ops  (CSPs) inside that it is difficult to choose either the CSPs  lives up to their licit desires for information security or not.  Thus, it is evaluative to think of gainful reviewing methods  to help proprietors' trust and dependence in distributed  storage. In this paper, we are introducing plan of evaluating  for guaranteed distributed storage dependent on  2-dimensional information structure called dynamic hash  table (DHT), used to record the information data for open  inspecting. This plan emigrates the endorsed data from the  CSP to the TPA, and along these lines amazing decrease in  the computational expense and correspondence overhead.  Furthermore, The deduplication innovation is used to bring  down the limit and data transfer capacity essentials of the  utilities by expelling tedious data and reserves just a unique  imitation of them. we upgrade our structure empowers  security safeguarding by homomorphic authenticator  developed on the open key and atten bunch evaluating by  total BLS signature strategy. Trial results demonstrate that  our instrument accomplishes secure deduplication and  improvement in label age. 

Downloads

Download data is not yet available.

References

H. Dewan and R. C. Hansdah, “A survey of cloud storage facilities,” in Proc. 7th IEEE World Congress Serv., Jul. 2011, pp. 224–231.

C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” IEEE Trans. Serv. Comput., vol. 5, no. 2, pp. 220–232, Apr.–Jun. 2012

K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Comput., vol. 16, no. 1, pp. 69–73, 2012.

J. Ryoo, S. Rizvi, W. Aiken, and J. Kissell. “Cloud security auditing: Challenges and emerging

approaches,” IEEE Security Privacy, vol. 12, no. 6, pp. 68–74, 2014.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609, 2007.

A. Juels and B. S. Kaliski Jr, “PORs: Proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference

G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, and R. Hao, “Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability,” Journal of Systems and Software, vol. 113, pp. 130–139, 2016.

C. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” ACM Transactions on Information and System Security (TISSEC), vol. 17, no. 4, pp. 213–222, 2015

Jian Liu, Kun Huang, Hong Rong, Huimei Wang and Ming Xian.” Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage” 10.1109/TIFS.2015.2416688, IEEE Transactions on information and security 2015

Taek-young youn, Ku-young chang1, Kyung-hyune rhee, and Sang uk shin “ Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage.” IEEE transactions on information forensics and security 2018.

M. Sookhak, A. Akhunzada, A. Gani, M. Khurram Khan, and N. B. Anuar, “Towards dynamic remote data auditing in computational clouds,” The Scientific World Journal, vol. 2014, pp. 1–12, 2014.

C. M. Geeta, S. Raghavendra, R. Buyya, K. R. Venugopal, S. S. Iyengar , and L. M. Patnaik, “Data auditing and security in cloud computing: issues, challenges and future directions,” International Journal of Computer (IJC), vol. 28, no. 1, pp. 8–57, 2018.

Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and C.-J. Hu, “Dynamic audit services for outsourced storage in clouds,” IEEE Trans. Serv. Comput., vol. 6, no. 2, pp. 227–238, Apr.–Jun. 2013.

] Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”IEEE transactions on services compG. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.

W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135. [17] H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. [18] B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.

C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995. [22] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.

(Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue). Available: http://www.(URL)

J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com

(Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given. Available: http://www.(URL)

R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3). pp. 876—880. Available: http://www.halcyon.com/pub/journals/21ps03-vidmar

Downloads

Published

2024-02-17

How to Cite

Multiauditing Based Cloud Storage Using Dynamic Hash Table. (2024). International Journal of Innovative Research in Computer Science & Technology, 8(3), 58–62. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13263