Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud

View through CrossRef
In cloud repository amenities, deduplication technology is often utilized to minimize the volume and bandwidth by removing repetitious information and caching only a solitary duplicate of them. Deduplication is extremely productive when many customers deploy the identical information to the cloud repository, but it aggrevates problems pertaining to safety and proprietorship. Proof-of-ownership mechanism authorize any possessor of an identical information to approve to the cloud repository server that he possess the information in a dynamic way. In repository utilities with enormous information, the repository servers may want to minimize the capacity of cached information, and the customers desires to examine the integrity of their information with a reasonable cost. Aiming at realizing integrity auditing and deduplication with effective proprietorship administration of information in the cloud, we propose Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud (VASD2OM) mechanism. It empowers the distributed server to limit access to the deployed information though the proprietorship transforms actively. Further, the mechanism supports safe and effective virtual auditing of the documents during the download process. In addition, the proposed mechanism lowers the burden of dataowner to audit documents by himself and there is no need to authorize auditing to a Third Party Auditor (TPA). Experimental results demonstrate that the virtual auditing has low auditing time cost relative to the existing public auditing schemes.
Title: VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
Description:
In cloud repository amenities, deduplication technology is often utilized to minimize the volume and bandwidth by removing repetitious information and caching only a solitary duplicate of them.
Deduplication is extremely productive when many customers deploy the identical information to the cloud repository, but it aggrevates problems pertaining to safety and proprietorship.
Proof-of-ownership mechanism authorize any possessor of an identical information to approve to the cloud repository server that he possess the information in a dynamic way.
In repository utilities with enormous information, the repository servers may want to minimize the capacity of cached information, and the customers desires to examine the integrity of their information with a reasonable cost.
Aiming at realizing integrity auditing and deduplication with effective proprietorship administration of information in the cloud, we propose Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud (VASD2OM) mechanism.
It empowers the distributed server to limit access to the deployed information though the proprietorship transforms actively.
Further, the mechanism supports safe and effective virtual auditing of the documents during the download process.
In addition, the proposed mechanism lowers the burden of dataowner to audit documents by himself and there is no need to authorize auditing to a Third Party Auditor (TPA).
Experimental results demonstrate that the virtual auditing has low auditing time cost relative to the existing public auditing schemes.

Related Results

How Error Correction Affects PCR Deduplication: A Survey Based on UMI Datasets of Short Reads
How Error Correction Affects PCR Deduplication: A Survey Based on UMI Datasets of Short Reads
AbstractNext-Generation Sequencing (NGS) data is widely utilised for various downstream applications in bioinformatics, and numerous techniques have been developed forPCR-deduplica...
AVOIDANCE OF DUPLICACY AND COMPELLING CLOUD SECURITY INDIFFERENT CLOUD SITUATIONS
AVOIDANCE OF DUPLICACY AND COMPELLING CLOUD SECURITY INDIFFERENT CLOUD SITUATIONS
Data deduplication is necessary for making data smaller and preventing duplication when transferring it. It is often used in cloud computing to increase the amount of data that can...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Public Audit and Secure Deduplication in Cloud Storage using BLS signature
Public Audit and Secure Deduplication in Cloud Storage using BLS signature
Although many researches have been done individually on each topic of secure deduplication andintegrity auditing, the study of the combined model of these two ...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Generic Ownership: a Practical Approach to Ownership and Confinement in Object-Oriented Programming Languages
Generic Ownership: a Practical Approach to Ownership and Confinement in Object-Oriented Programming Languages
<p>Modern object-oriented programming languages support many techniques that simplify the work of a programmer. Among them is generic types: the ability to create generic des...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...

Back to Top