IJMTES – ANTISTATIC AND AUTHENTICATIVE MULTIUSER PROOF OF STORAGE IN CLOUD ENVIRONMENT

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : ANTISTATIC AND AUTHENTICATIVE MULTIUSER PROOF OF STORAGE IN CLOUD ENVIRONMENT

Author’s Name : R Janani Abinaya | M Westring Hannah | S Hashbas | G Prince Devarajunnamed

Volume 04 Issue 03 2017

ISSN no:  2348-3121

Page no: 6-9

Abstract – Dynamic Proof of Storage (PoS) could be a helpful cryptanalytic primitive that allows a user to ascertain the integrity of outsourced files and to expeditiously update the files in a very cloud server. though researchers have planned several dynamic PoS schemes in single user environments, the matter in multi-user environments has not been investigated sufficiently. A sensible multi-user cloud storage system desires the secure client-side cross-user deduplication technique, that permits a user to skip the uploading method and procure the possession of the files right away, once different homeowners of an equivalent files have uploaded them to the cloud server. To the simplest of our data, none of the prevailing dynamic PoSs will support this method. during this paper, we tend to introduce the thought of deduplicatable dynamic proof of storage ANd propose an economical construction referred to as DeyPoS, to realize dynamic PoS and secure cross-user deduplication, at the same time. Considering the challenges of structure diversity and personal tag generation, we tend to exploit a unique tool referred to as Homomorphic attested Tree (HAT).

Reference

  1. Ardagna C.A., Asal R., Damiani E., and Vu Q.H. (2015), ‘From Security to Assurance in the Cloud: A Survey’, ACM Comput. Surv., Vol. 48, No. 1, pp. 2:1–2:50,.
  2. Ateniese H., Burns R., Curtmola R., Herring J., Kissner L., Peterson Z., and Song D. (2007), ‘Provable data possession at untrusted Stores’, in Proc. of CCS, pp. 598–609.
  3. Ateniese G., Di Pietro R., Mancini L.V., and Tsudik G. (2008), ‘Scalable and Efficient Provable Data Possession’, in Proc. of SecureComm, pp. 1–10.
  4. Bowers K.D., Juels A., and Oprea A. (2009), ‘HAIL: A high-availability and integrity layer for cloud storage’, in Proc. of CCS, pp. 187–198, 2009.
  5. Du R., Deng L., Chen J., He K., and Zheng M. (2014), ‘Proofs of ownership and retrievability in cloud storage’, in Proc. of TrustCom, pp. 328–335.
  6. Juels A. and Kaliski B.S., Jr. (2007), ‘PORs: Proofs of retrievability for large files’, in Proc. of CCS, pp. 584–597.
  7. Kamara S. and Lauter K. (2010), ‘Cryptographic cloud storage’, in Proc. of FC, pp. 136–149.
  8. Li J., Chen X., Li.M, Li.J, Lee P., and Lou W. (2014), ‘Secure Deduplication with Efficient and Reliable Convergent Key Management’, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 6,pp. 1615–1625.
  9. Li J., Li Y.K., Chen X., Lee P., and Lou W. (2015), ‘A Hybrid Cloud Approach for Secure Authorized Deduplication’, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 5, pp. 1206–1216.
  10. Shi E., Stefanov E., and Papamanthou C. (2013), ‘Practical dynamic proofs of retrievability’, in Proc. of CCS, pp. 325–336.
  11. Wang Q., Wang C., Li J., Ren K., and Lou W. (2009), ‘Enabling public verifiability and data dynamics for storage security in cloud computing’, in Proc. of ESORICS, pp. 355–370.
  12. Wang C., Wang Q., Ren K., and Lou W. (2010), ‘Privacy-preserving public auditing for data storage security in cloud computing’, in Proc. Of INFOCOM, pp. 1–9.
  13. Xia Z., Wang X., Sun X., and Wang Q. (2016), ‘A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data’, IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 2, pp. 340–352.
  14. Xiao Z. and Xiao Y. (2013), ‘Security and privacy in cloud computing’, IEEE Communications Surveys Tutorials, Vol. 15, No. 2, pp. 843–859.
  15. Zheng Q. and Xu S. (2012), ‘Secure and efficient proof of storage with deduplication’, in Proc. of CODASPY, pp. 1–12.