Submit Search
Upload
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud Storage
•
0 likes
•
20 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i6/IRJET-V6I6130.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in Cloud
Editor IJCATR
Towards secure and dependable storage
Towards secure and dependable storage
Khaja Moiz Uddin
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud Computing
IJMER
An Efficient Approach to Manage Small Files in Distributed File Systems
An Efficient Approach to Manage Small Files in Distributed File Systems
IRJET Journal
The enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloud
journalBEEI
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...
IRJET Journal
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET Journal
Recommended
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in Cloud
Editor IJCATR
Towards secure and dependable storage
Towards secure and dependable storage
Khaja Moiz Uddin
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud Computing
IJMER
An Efficient Approach to Manage Small Files in Distributed File Systems
An Efficient Approach to Manage Small Files in Distributed File Systems
IRJET Journal
The enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloud
journalBEEI
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...
IRJET Journal
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET Journal
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
seed block algorithm
seed block algorithm
Dipak Badhe
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
INFOGAIN PUBLICATION
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
ORUTA BASE PAPER
ORUTA BASE PAPER
suthi
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
IAEME Publication
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
ijdms
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Nexgen Technology
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
IRJET Journal
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET Journal
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET Journal
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
IRJET Journal
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
neirew J
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
eSAT Journals
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
The Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE Network
IRJET Journal
Data Replication In Cloud Computing
Data Replication In Cloud Computing
Rahul Garg
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal
Cloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET Journal
More Related Content
What's hot
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
seed block algorithm
seed block algorithm
Dipak Badhe
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
INFOGAIN PUBLICATION
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
ORUTA BASE PAPER
ORUTA BASE PAPER
suthi
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
IAEME Publication
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
ijdms
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Nexgen Technology
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
IRJET Journal
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET Journal
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET Journal
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
IRJET Journal
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
neirew J
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
eSAT Journals
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
The Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE Network
IRJET Journal
Data Replication In Cloud Computing
Data Replication In Cloud Computing
Rahul Garg
What's hot
(19)
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
seed block algorithm
seed block algorithm
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
ORUTA BASE PAPER
ORUTA BASE PAPER
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
The Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE Network
Data Replication In Cloud Computing
Data Replication In Cloud Computing
Similar to IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud Storage
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal
Cloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET Journal
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
Authorized Duplicate Check Scheme
Authorized Duplicate Check Scheme
IRJET Journal
Google File System
Google File System
vivatechijri
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
IRJET- Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
A cloud environment for backup and data storage
A cloud environment for backup and data storage
IGEEKS TECHNOLOGIES
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
Eswar Publications
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET Journal
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET Journal
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
Similar to IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud Storage
(20)
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Cloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
Authorized Duplicate Check Scheme
Authorized Duplicate Check Scheme
Google File System
Google File System
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET- Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
A cloud environment for backup and data storage
A cloud environment for backup and data storage
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Recently uploaded
(20)
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
power system scada applications and uses
power system scada applications and uses
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Internship report on mechanical engineering
Internship report on mechanical engineering
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud Storage
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 581 An Integrity Auditing &Data Dedupe with Effective Bandwidth in Cloud Storage Smita Anandrao Patil1, Gayatri Londhe 2 1Assistant Professor, Dept. of E&TC Engineering, Dr. D.Y. Patil Institute of Technology, Pune, Maharashtra, India 2Assistant Professor, Dept. of E&TC Engineering, Dr. D.Y. Patil Institute of Technology, Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Cloud computing is said to be the biggest thing from the beginning of the era of internet. In fact, cloud computing could be the greatest technical breakthrough anyone can experience in the lifetime. However, adopting cloud computing for any business is a complex decision that involves many aspects. The key factors are security of data, privacy, compliance to regulatory requirements, performance in a multi-tenant environment and 24/7 availability. Cloud computing makes use of applications, development platforms and system hardware in remote datacenters to deliver services over the internet. Cloud computing tightens the security by regulating user authentications, by using cloud resources and by monitoring user trace and activities. Cloud computing allows its users to access, use and store the data. To manage this data, to check the integrity of this data and to provide security to this data a secure system is needed. Third party auditor (TPA) checks the integrity of data. A well-known hashing algorithm, standard hashing algorithm is used for checking the existence of data which is helpful for checking the deduplication. Deduplication is a data compression technique which discards the duplicate copies of data having same content. Also Advance Encryption standard algorithm is used for enhancing the privacy and security of data. Key Words: TPA; SHA-512; MHT; BANDWIDTH 1. INTRODUCTION Cloud is a source where data owners have a convenient, reliable, on-demand access and it combines the resources, such as servers, storage and applications over the internet. Users don't have a control of underlying hardware infrastructure that is owned and managed by the provider. They access the services or allocated resources by using a web browser. Cloud computing provides suitable, on request network which can be disclosed with essential Management effort or gives best service interaction. It can be provisioned promptly to combined resources such as storage, applications, services, networks and servers. Although cloud computing can accumulate very large data, it fails to provide network bandwidth and save disk space because two or more clients upload the same file. To overcome this problem, a well-known data compression technique termed as deduplication is used. In data deduplication, rather than storing number of data copies having same content, server removes duplicate data copies by storing only one physical copy and referring other data copies to the already stored data copy. The Third party auditor is a kind of inspector. In cloud environment anyone can access the data over the internet. Hence user authentication and access control is very important in the cloud. Trusted third parties are independent service providers and are assumed to have a certain level of trust.. It is very important to provide public auditing service for cloud data storage, so that the user trusts an independent third party. The Trusted Third Party (TPA) checks the integrity of data by taking the current (this value is sent by service provider to TPA which is a live hash value) and actual hashing value (this value is sent by the user) of the file and gives response to user Fig -1: Cloud Storage System 2. BACKGROUND THEORY User/Client- It is one of the element of cloud who is going to store his/her data or files on cloud space. he/she can access or modify data at any time from any place and anytime. CSP/Admin-It is the owner of the cloud who is going to provide storage space and on demand services to the users who is registered with the cloud. He is the one who is responsible for issues related to userdata.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 582 TPA-Third Party Auditor- This is the main element of cloud who works on behalf of the client.TPA is checking integrity of data and notify the status of data when user send a request for integrity checking of Files or data. It reduces the burden of user by taking care of data 3. PROPOSED SYSTEM A model is prepared in which client, a cloud service provider (CSP)/cloud server and TPA are present. Cloud user is the one who stores large amount of data or less on a cloud server. Users are the devices that the end users interact with to manage their information on the cloud. Cloud server is a place where we are storing cloud data and that data will be managed by the cloud service provider. Third party auditor acts as an inspector which varies the users authentication and also checks the integrity of data. Performance and efficiency is better than existing systems as we are using two TPAs. i.e. if main TPA goes offline secondary TPA will take care of user data. As user cannot store data directly on cloud server thus It is encrypted with AES-128 algorithm which is faster in encryption and decryption than RSA and it requires less storage requirement. SHA-512 and MHT (Merkle Hash Tree) algorithm are used for authentication and data integrity checking. With this efficient data integrity checking it also provides data recovery in case when data is corrupted. Also user can edit his/her file any time and all the updating made by user stored on clouds so that after modification done by user if he want his original file that file can also recover with this scheme. File is divided into different fragment and each fragment is secured with key so that it is difficult to hack file. With this proposed scheme also supports auditing for dynamic data as well as support dynamic operation on data. Proposed system model is divided into different phases 1] Uploading/downloading of file 2] Authentication of file 3] Integrity checking of file 4] De-dupe of data Fig -2: Data De-duplication Byte level de-duplication: Byte-level deduplication, as shown in Figure 2.2, doesn't need extra processing. In this scenario data groups are analyzed in the earliest way, byte by byte. For unnecessary groups it works more efficiently. Time required to perform Byte-level deduplication is more as compared to other levels. Fig -3: Byte level de-duplication Block level de-duplication: The problem mentioned above can be resolved by using a block level data de-duplication method as shown in Figure since, it does not have such a drawback. At the block level data de-duplication, many groups of block having fixed or variable length are formed by splitting a file. If any minor change is made in large file then rather than storing all fragments, the system stores its changed fragment only. Block level de-duplication requires more processing power as compared to file level de-duplication since there is a great increase in the number of hash values that need to be processed. In the same way, index of block level for tracking individual block increases in large scale. Complexity is more in case of variable length blocks. It may possible that for two different data fragments the same hash number may be generated, which is called as a hash collision. The system will not save any new data if such thing happens because it observes that, index already have that hash number. According to environment requirements variable block size can be specified 4 or 256 Kb or any other. In this, block sizes having larger size requires fewer comparisons, but in some cases it provides minimum compression and more comparisons are required for smaller one as it provides better compression. Fig -4: Block level de-duplication
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 583 File level de-duplication: File level de-duplication, can be performed without difficulty as shown in figure Entire files hash number is easy to generate by using hashing algorithm. Hence, it requires fewer computations. However, limitation of this method is, Hash number will change even if there is a change in single byte. This forces cloud server to save both file versions into cloud storage. Fig -5: File level de-duplication 4. PERFORMANCE ANALYSIS Figure shows comparative analysis of storage space in existing system and implemented system. On x-axis no. of files are shown and on y-axis size in mb is shown. In first case 10 files are considered and in second case 20 files are considered. Existing system does not remove duplicated files as such it requires more space as compared to implemented system. In implemented system duplicated copies are stored only once. Table shows data of storage space. Chart -1: comparative analysis of storage space Figure shows time required for auditing by CSP and TPA. We took files of size 130 mb, 190 mb and 460 mb. In all three cases, time required to audit file by TPA is more. Table shows data of file auditing. Chart -2: Comparative analysis of Time Requirement Sample paragraph Define abbreviations and acronyms the first time they are used in the text, even after they have been defined in the abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable. After the text edit has been completed, the paper is ready for the template. Duplicate the template file by using the Save As command, and use the naming convention prescribed by your conference for the name of your paper. In this newly created file, highlight all of the contents and import your prepared text file. You are now ready to style your paper. 5. CONCLUSION A system is implemented for security of user's data when data is stored into the cloud. Preserving privacy in a cloud environment is done by using convergent encryption method. To protect the data from unauthorized access and to ensure that data is intact, the TPA model implemented a scheme, which solves a problem of integrity, unauthorized access, privacy and consistency. In implemented system there is intervention of TPA which reduces the overhead of user. While uploading the file in cloud, TPA generates the hash value for checking the deduplication of that file. TPA does not leak any side channel information. In implemented system, a system is designed having intervention of TPA and using SHA for hash value and AES for encryption. Aiming to achieve securing cloud files and deduplication, a better encryption method AES is being used. SHA generates strong message digest which is more secure. Also because of using convergent encryption method, system has become more secure.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 584 REFERENCES [1] Jingwei Li, Jin Li, Dongqing Xie and Zhang Cai, “Secure Auditing and Deduplicating Data in Cloud", in Proceedings of the IEEE Transactions on Computers, Vol. 65, No.8, Pp. 2386 - 2396, 2016. [2] M. Armbrust, A. Fox, R. Griffth, A. D. Joseph, R. Katz, A. Konwinski, G. Lee,D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,"Communication of the ACM, Vol. 53, No. 4, Pp.50-58, 2010. [3] J. Yuan and S.Yu, “Secure and constant cost public cloud storage auditing with de-duplication",in IEEE Conference on Communications and Network Security , Pp.145-153, 2013. [4] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman- Peleg, “Proofs of ownership in remote storage systems," in Proceedings of the 18th ACM Conference on Computer and Communications Security, Pp. 491-500, 2011. [5] S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Server aided encryption for deduplicated storage," in Proceedings of the 22Nd USENIX Conference on Security, Pp. 179- 194, 2013. [6] Renuka Goyal and Navjot Sidhu, “Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing", in Proceedings of the (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5, No.3, Pp. 4526-4530, 2014. [7] S. Nair, Anitha K L and R. Kamala, "Trusted Third Party Authentication in Cloud Computing", in Proceedings of the International Journal of Engineering and Technology (IJERT), Vol. 2 No. 11, Pp. 354-358, 2013. [8] R. Di Pietro and A. Sorniotti, “Boosting efficiency and security in proof of ownership for de- duplication", in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, Pp. 81-82, 2012. [9] W. K. Ng, Y.Wen, and H. Zhu, "Private data de- duplication protocols in cloud storage", in Proceedings of the 27th Annual ACM Symposium on Applied Computing, Pp.441-446, 2012. [10] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure de- duplication," in Proceedings of the Advances in Cryptology { EUROCRYPT, Vol.7881, Pp. 296-312, 2013. [11] M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev, “Message-locked encryption for lock-dependent messages," in Proceedings of the Advances in Cryptology- CRYPTO,Vol.8042, Pp. 374-391.
Download now