DATA COMPRESSION TECHNIQUE FOR CLOUD STORAGE IN MULTI-USER ENVIRONMENTS
DOI:
https://doi.org/10.22159/ajpcr.2017.v10s1.19570Keywords:
Deduplication, Proof of storage, Homo-Morphic Authentication (HAT)Abstract
In many associations, the cloud storages contain a copy (duplicates) of information. For example, the same file would be spared in various locations by different users; too many documents that are not differentiable may in any case duplication a great part of the same data. This consumes lots of memory in cloud storage. Deduplication is a kind of technique used to eliminate duplicate entries on cloud storage. It helps us to remove the duplicate entries of these additional duplicates, by maintaining only one duplicate of the information and giving ownership rights to the alternate duplicates with pointers that lead back to the first duplicate. Organizations much of the time utilizes this technique in cloud storage for many applications, yet it can be effectively utilized to free up space in vital situations also. To allow an end-user to have the ownership of the file if the file is already existing and should terminate the uploading process to the cloud storage server
Downloads
References
Xu W, Feng D, Liu J. Wuhan national lab for optoelectronics, publicverifiable proof of storage protocol from lattice assumption. IEEE International Conference on Engineering and Technology (ICETECH); 2015.
Hur J, Ko D, Shinn Y, Kang K. Secured data deduplication with Dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng. DOI: 10.1109/TKDE.2016.2580139.
Kaaniche N, Laurent M. SHOPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications. Institut Mines-Telecom, Telecom SudParis, UMR CNRS 5157 SAMOVAR. IEEE World Congress on Services; 2015.
Li J, Li YK, Chen X, Lee PP, Lou W. A Hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst. DOI: 10.1109/TPDS.2014.2318320.
Ren Z, Wang L, Wang Q, Xu M. Dynamic proofs of retrievability for coded cloud storage Systems. IEEE Transactions on Services Computing.7. Computer Security Institute, Computer Crime and Security Survey; 2010, 2011. DOI: 10.1109/TSC.2015.2481880.
Saritha K, Subasree S. Analysis of hybrid cloud approach for private cloud in the de-duplication mechanism. IEEE International Conference on Engineering and Technology (ICETECH). Coimbatore, TN, India,
th March; 2015.
Xian Z, Waang X, Sun X, Waang Q. A secure and dynamic multi-keywords ranked search schemes over encrypted cloud data. IEEE Trans Parallel Distrib Syst 2016;27(2):340-52.
Xiaoo ZJ, Xiao YD. Security and privacy in cloud computing. IEEE Commun Surv Tutor 2013;15(2):843-59.
Ardagnaa CA, Asaal R, Daamiani E, Vu QH. From security to assurances in the cloud: A survey. ACM Comput Surv
;48(1):201.
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, et al. Provable data possessions at untrusted stores. In: Proceeding of CCS. 2007. p. 598609.
Published
How to Cite
Issue
Section
The publication is licensed under CC By and is open access. Copyright is with author and allowed to retain publishing rights without restrictions.