Full Paper View Go Back

A Survey on –Preserving Deduplication with Auditing Techniques In Cloud Networks- Recent Appraoches

Basheer P.1

Section:Survey Paper, Product Type: Journal-Paper
Vol.8 , Issue.5 , pp.64-69, Oct-2020


Online published on Oct 31, 2020


Copyright © Basheer P. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Basheer P. , “A Survey on –Preserving Deduplication with Auditing Techniques In Cloud Networks- Recent Appraoches,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.5, pp.64-69, 2020.

MLA Style Citation: Basheer P. "A Survey on –Preserving Deduplication with Auditing Techniques In Cloud Networks- Recent Appraoches." International Journal of Scientific Research in Computer Science and Engineering 8.5 (2020): 64-69.

APA Style Citation: Basheer P. , (2020). A Survey on –Preserving Deduplication with Auditing Techniques In Cloud Networks- Recent Appraoches. International Journal of Scientific Research in Computer Science and Engineering, 8(5), 64-69.

BibTex Style Citation:
@article{P._2020,
author = {Basheer P. },
title = {A Survey on –Preserving Deduplication with Auditing Techniques In Cloud Networks- Recent Appraoches},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2020},
volume = {8},
Issue = {5},
month = {10},
year = {2020},
issn = {2347-2693},
pages = {64-69},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2105},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2105
TI - A Survey on –Preserving Deduplication with Auditing Techniques In Cloud Networks- Recent Appraoches
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Basheer P.
PY - 2020
DA - 2020/10/31
PB - IJCSE, Indore, INDIA
SP - 64-69
IS - 5
VL - 8
SN - 2347-2693
ER -

246 Views    370 Downloads    76 Downloads
  
  

Abstract :
In the current scenario, cloud technologies have attained massive popularity. This cloud technology is used in many applications .In cloud innovation, is the on-request availability of framework assets, information stockpiling and figuring power, without direct dynamic oversight by client. It requires set of equipment and programming components expected to empower distributed computing. The dynamic nature of networks makes them more and more functional and optimal for many applications. Cloud stores your data in data center. This nature of Cloud is more vulnerable to many issues such as ?le deduplication and integrity auditing. In cloud networks, instantaneously needs to be complete these issues urgently in academic world and industry. This is a more important challenging issue, which need more analysis. In past few years, numerous researchers proposed different solutions for ?le deduplication and integrity auditing in Cloud Computing. In this survey, recent approaches and techniques done for Cloud deduplication and auditing is discussed effectively. The review totally presents the issues and deserves of these existing approaches.

Key-Words / Index Term :
Cloud networks, Cloud storage, deduplication, cloud auditing, security and privacy

References :
[1] Ali Gholami, Erwin Laure, “Security and privacy issues in cloud computing,”International Journal of Network Security & Its Applications, Vol.8, Issue.1, pp.59-79, 2016.
[2] Wang, Qian, "Enabling public auditability and data dynamics for storage security in cloud computing." IEEE transactions on parallel and distributed systems ,Vol.22, Issue.5, pp.847-859, 2010.
[3] H. Hou, J. Yu, and R. Hao,‘‘Cloud storage auditing with deduplication supporting different security levels according to data popularity,’’ J. Netw. Comput. Appl., vol. 134, pp. 26–39,
2019.
[4] M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller,‘‘ Secure data deduplication,’’ IEEE Trans. Parallel Distrib. Syst, vol. 134, pp. 1–10, 2008.
[5] R. Di Pietro and A. Sorniotti, ‘‘Boosting ef?ciency and security in proof of ownership for deduplication,’’ in Proc. ASIACCS, Seoul, South Korea, pp. 81–87, 2012.
[6] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, ‘‘Reclaiming space from duplicate ?les in a serverless distributed ?le system,’’ IEEE Trans. Parallel Distrib. Syst, pp. 617–624, 2012.
[7] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, ‘‘Remote data checking using provable data possession,’’ ACM Trans. Inf. Syst. Secur., Vol.14,pp.1-12, 2011
[8] G.Ateniese,R.DiPietro,L.V.Mancini,andG.Tsudik,‘‘Scalableandef?cient provable data possession,’’ in Proc. SecureComm, Istanbul,Turkey, Vol.12, pp.1-12, 2013
[9] H. Tian, Y. Chen, C.-C. Chang, H. Jiang, Y. Huang, Y. Chen, and J. Liu, ‘‘Dynamic-hash-table based public auditing for securecloudstorage,’’IEEETrans.ServicesComput.,vol.10,pp.701–714,Sep./Oct.2017.
[10] A. Juels and J. B. S. Kaliski, Jr., ‘‘PORs: Proofs of retrievability for large ?les,’’ ACM Trans. Inf. Syst. Secur, pp. 584–597, 2011.
[11] J.YuanandS.Yu,‘‘Secure and constant cost public cloud storage auditing with deduplication,’’ in Proc. IEEE CNS, National Harbor, pp. 145–153, 2013.
[12] J. Li, J. Li, D. Xie, and Z. Cai, ‘‘Secure auditing and deduplicating data in cloud,’’ IEEE Trans. Comput., vol. 65, pp. 51–57,2016.
[13] C. Li and Z. Liu, ‘‘A secure privacy-preserving cloud auditing scheme with data deduplication,’’ IEEE Trans. Parallel Distrib. Syst, pp. 117–124, 2019.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation