A Review on Secure Data Auditing with Proxy Code Regeneration in Cloud Data Deduplication Environment |
Author(s): |
| Arti Bairagi , Computer Engineering Department, Savitribai Phule University, Nasik, India, ; Prof. P. M. Yawalkar, Computer Engineering Department, Savitribai Phule University, Nasik, India, |
Keywords: |
| Cloud Computing, Secure Data Auditing |
Abstract |
|
Recently, outsourcing data to cloud is become more attractive way. Due to lower cost of cloud storage one can store and manage their large amount of data. Cloud provides different services over stored data such as, proper management of data, searching, sharing of data etc. Many times while outsourcing the data it happens that same copy of the data is available in cloud server, which tends to data duplication and wastage of disk space of server. Also network bandwidth is required to upload same kind of data i.e. duplicate file. Saving duplicate files to cloud is an inefficient task. Deduplication of data is one of the most recent techniques in cloud storage to remove duplicate copies from cloud server and maintain its storage space. With data deduplication many organizations, companies get benefits to save their money while storing data in cloud. Deduplication avoids duplication of data caused by both privileged and non-privileged users. Another major problem is security challenges in outsourcing of data to cloud such as, revealing of original data, unauthorised access to cloud data etc. During integrity auditing, CSP quietly hides some data loss facts from client to maintain their status. Hence user cannot get original copy of data from trusted cloud also. Data deduplication and failure reparation to the cloud storage is difficult. Regenerating codes technique gets more popularity due their lower repair bandwidth and it provides fault tolerance. Erasure code is new technique for regenerating code to achieve reception efficiency i.e. recovery of data. In this research idea is to achieve both data integrity and deduplication in cloud which uploads customer’s data in encrypted form and allows for integrity auditing and secure deduplication directly on encrypted data by implementing new strategy of regenerating code i.e. “erasure codingâ€. |
Other Details |
|
Paper ID: IJSRDV4I100217 Published in: Volume : 4, Issue : 10 Publication Date: 01/01/2017 Page(s): 598-601 |
Article Preview |
|
|
|
|
