A Survey on –Preserving Deduplication with Auditing Techniques In Cloud Networks- Recent Appraoches

Authors

  • Basheer P. Department of Computer Science, Muhammed Abdurahiman Memorial Orphanage College, Manassery, Kozhikode, Kerala

Keywords:

Cloud networks, Cloud storage, deduplication, cloud auditing, security and privacy

Abstract

In the current scenario, cloud technologies have attained massive popularity. This cloud technology is used in many applications .In cloud innovation, is the on-request availability of framework assets, information stockpiling and figuring power, without direct dynamic oversight by client. It requires set of equipment and programming components expected to empower distributed computing. The dynamic nature of networks makes them more and more functional and optimal for many applications. Cloud stores your data in data center. This nature of Cloud is more vulnerable to many issues such as ?le deduplication and integrity auditing. In cloud networks, instantaneously needs to be complete these issues urgently in academic world and industry. This is a more important challenging issue, which need more analysis. In past few years, numerous researchers proposed different solutions for ?le deduplication and integrity auditing in Cloud Computing. In this survey, recent approaches and techniques done for Cloud deduplication and auditing is discussed effectively. The review totally presents the issues and deserves of these existing approaches.

 

References

Ali Gholami, Erwin Laure, “Security and privacy issues in cloud computing,”International Journal of Network Security & Its Applications, Vol.8, Issue.1, pp.59-79, 2016.

Wang, Qian, "Enabling public auditability and data dynamics for storage security in cloud computing." IEEE transactions on parallel and distributed systems ,Vol.22, Issue.5, pp.847-859, 2010.

H. Hou, J. Yu, and R. Hao,‘‘Cloud storage auditing with deduplication supporting different security levels according to data popularity,’’ J. Netw. Comput. Appl., vol. 134, pp. 26–39,2019.

M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller,‘‘ Secure data deduplication,’’ IEEE Trans. Parallel Distrib. Syst, vol. 134, pp. 1–10, 2008.

R. Di Pietro and A. Sorniotti, ‘‘Boosting ef?ciency and security in proof of ownership for deduplication,’’ in Proc. ASIACCS, Seoul, South Korea, pp. 81–87, 2012.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, ‘‘Reclaiming space from duplicate ?les in a serverless distributed ?le system,’’ IEEE Trans. Parallel Distrib. Syst, pp. 617–624, 2012.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, ‘‘Remote data checking using provable data possession,’’ ACM Trans. Inf. Syst. Secur., Vol.14,pp.1-12, 2011

G.Ateniese,R.DiPietro,L.V.Mancini,andG.Tsudik,‘‘Scalableandef?cient provable data possession,’’ in Proc. SecureComm, Istanbul,Turkey, Vol.12, pp.1-12, 2013

H. Tian, Y. Chen, C.-C. Chang, H. Jiang, Y. Huang, Y. Chen, and J. Liu, ‘‘Dynamic-hash-table based public auditing for securecloudstorage,’’IEEETrans.ServicesComput.,vol.10,pp.701–714,Sep./Oct.2017.

A. Juels and J. B. S. Kaliski, Jr., ‘‘PORs: Proofs of retrievability for large ?les,’’ ACM Trans. Inf. Syst. Secur, pp. 584–597, 2011.

J.YuanandS.Yu,‘‘Secure and constant cost public cloud storage auditing with deduplication,’’ in Proc. IEEE CNS, National Harbor, pp. 145–153, 2013.

J. Li, J. Li, D. Xie, and Z. Cai, ‘‘Secure auditing and deduplicating data in cloud,’’ IEEE Trans. Comput., vol. 65, pp. 51–57,2016.

C. Li and Z. Liu, ‘‘A secure privacy-preserving cloud auditing scheme with data deduplication,’’ IEEE Trans. Parallel Distrib. Syst, pp. 117–124, 2019.

Downloads

Published

2020-10-31

How to Cite

[1]
B. P., “A Survey on –Preserving Deduplication with Auditing Techniques In Cloud Networks- Recent Appraoches”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 8, no. 5, pp. 64–69, Oct. 2020.

Issue

Section

Survey Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.