Outsourcing Of Multi-Copy Dynamic Data And Alleviate Data Storage And Maintenance

Sushma Talluri

Abstract


OUTSOURCING information to a remote cloud administration supplier (CSP) permits associations to store a greater number of information on the CSP than on private PC frameworks. we propose a guide based provable multicopy dynamic information ownership (MB-PMDDP) plan that has the accompanying elements: 1) it gives a confirmation to the clients that the CSP is not tricking by putting away less duplicates; 2) it bolster s outsourcing of element information, i.e., it underpins piece level operations, for example, square alteration, insertion, erasure, and add; and 3) it permits approved clients to consistently get to the document copies stored by the CSP.


References


G. Atenieseet al., “Provable data possession at untrusted stores,” inProc. 14th ACM Conf. Comput. Commun. Secur. (CCS), New York, NY,USA, 2007, pp. 598–609.

K. Zeng, “Publicly verifiable remote data integrity,” in Proc. 10th Int.Conf. Inf. Commun. Secur. (ICICS), 2008, pp. 419–434.

Y. Deswarte, J.-J. Quisquater, and A. Saïdane, “Remote integritychecking,” in Proc. 6th Working Conf. Integr. Internal Control Inf.Syst. (IICIS), 2003, pp. 1–11.

D. L. G. Filho and P. S. L. M. Barreto, “Demonstratingdata possession and uncheatable data transfer,” IACR (InternationalAssociation for Cryptologic Research) ePrint Archive,Tech. Rep. 2006/150, 2006.

F. Sebé, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, andJ.-J. Quisquater, “Efficient remote data possession checking in criticalinformation infrastructures,” IEEE Trans. Knowl. Data Eng., vol. 20,no. 8, pp. 1034–1038, Aug. 2008.

P. Golle, S. Jarecki, and I. Mironov, “Cryptographic primitives enforcingcommunication and storage complexity,” in Proc. 6th Int. Conf. FinancialCryptograph. (FC), Berlin, Germany, 2003, pp. 120–135.

M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing tokeep online storage services honest,” in Proc. 11th USENIX WorkshopHot Topics Oper. Syst. (HOTOS), Berkeley, CA, USA, 2007, pp. 1–6.

M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving auditand extraction of digital contents,” IACR Cryptology ePrint Archive,Tech. Rep. 2008/186, 2008.

E. Mykletun, M. Narasimha, and G. Tsudik, “Authentication andintegrity in outsourced databases,” ACM Trans. Storage, vol. 2, no. 2,pp. 107–138, 2006.

G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalableand efficient provable data possession,” in Proc. 4th Int. Conf. Secur.Privacy Commun. Netw. (SecureComm), New York, NY, USA, 2008,Art. ID 9.

C. Wang, Q. Wang, K. Ren, and W. Lou. (2009). “Ensuring data storagesecurity in cloud computing,” IACR Cryptology ePrintArchive, Tech.Rep. 2009/081. [Online]. Available: http://eprint.iacr.org/

C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamicprovable data possession,” in Proc. 16th ACM Conf. Comput. Commun.Secur. (CCS), New York, NY, USA, 2009, pp. 213–222.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling publicverifiability and data dynamics for storage security in cloud computing,”in Proc. 14th Eur. Symp. Res. Comput. Secur. (ESORICS), Berlin,Germany, 2009, pp. 355–370.

Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integritychecking protocol with data dynamics and public verifiability,” IEEETrans. Knowl. Data Eng., vol. 23, no. 9, pp. 1432–1437, Sep. 2011.

A. F. Barsoum and M. A. Hasan. (2010). “Provable possession andreplication of data over cloud servers,” Centre Appl. Cryptograph. Res.,Univ. Waterloo, Waterloo, ON, USA, Tech. Rep. 2010/32.

[Online]. Available: http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-32.pdf


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.