International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-6, March 2020
5504
Retrieval Number: F7825038620/2020©BEIESP
DOI:10.35940/ijrte.F7825.038620
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Abstract: In cloud repository amenities, deduplication
technology is often utilized to minimize the volume and
bandwidth by removing repetitious information and caching only
a solitary duplicate of them. Deduplication is extremely
productive when many customers deploy the identical
information to the cloud repository, but it aggrevates problems
pertaining to safety and proprietorship. Proof-of-ownership
mechanism authorize any possessor of an identical information
to approve to the cloud repository server that he possess the
information in a dynamic way. In repository utilities with
enormous information, the repository servers may want to
minimize the capacity of cached information, and the customers
desires to examine the integrity of their information with a
reasonable cost. Aiming at realizing integrity auditing and
deduplication with effective proprietorship administration of
information in the cloud, we propose Virtual Auditing and
Secure Deduplication with Dynamic Ownership Management in
Cloud (VASD
2
OM) mechanism. It empowers the distributed
server to limit access to the deployed information though the
proprietorship transforms actively. Further, the mechanism
supports safe and effective virtual auditing of the documents
during the download process. In addition, the proposed
mechanism lowers the burden of dataowner to audit documents
by himself and there is no need to authorize auditing to a Third
Party Auditor (TPA). Experimental results demonstrate that the
virtual auditing has low auditing time cost relative to the existing
public auditing schemes.
Keywords: Cloud storage, Deduplication, Encryption, Proof-
of-Ownership, Revocation, Virtual auditing.
I. INTRODUCTION
Cloud computing delivers extensible, inexpensive and
location-independent online facilities extending from simple
backup facilities to distributed repository frameworks. Now
a days optical networks [1], [2] have been deployed all over
the globe for efficient information communication. The
rapid expansion of information capacity stockpiled in the
distributed repository has compelled to a rising need for
procedures for conserving disk capacity and network
bandwidth.
Revised Manuscript Received on March 30, 2020.
Geeta C Mara*, CSE, University Visvesvaraya College of Engg,
Bangalore University, Bangalore, India. Email: geetacmara@gmail.com
Nikhil R C, ASE, Jain University, Bengaluru, India.
Email:nikhilrc1504@gmail.com
Raghavendra S, CSE,University Visvesvaraya College of Engg,
Bangalore University, Bangalore, India. Email: raghush86@gmail.com
Rajkumar Buyya, CSE, The University of Melbourne,
Australia.Email:rbuyya@unimelb.edu.au
Venugopal K R, Bangalore University, Bangalore, India. Email:
venugopalkr@gmail.com
To minimize resource utilization, various distributed
repository utilities, such as Dropbox [3], Google Drive [4],
make use of deduplication procedure, where the distributed
repository saves one solitary duplicate of repetitious
information and furnishes links to the copy rather than of
saving other genuine copies of that information, irrespective
of the number of customers request to save the information.
In order to secure their personal information from
unapproved external attackers and from the Cloud Service
Provider (CSP) [5], customers encode their documents
before deploying to the distant server. While, traditional
encryption cannot be used to carry out deduplication due to
the following reasons; Deduplication method takes benefit of
information equivalence to recognize the identical
information and decrease the repository capacity. On the
contrary, the cryptographic algorithms shuffle the encoded
documents in order to make ciphertext equivalent from
theoretically random information. Encryption of the identical
documents by distinct customers with distinct encryption
keys results in distinct ciphertexts makes it critical for the
distributed server to determine if the plaintext are identical
and deduplicate them.
Concurrent encryption [6] solves this issue successfully.
The concurrent encryption algorithm encodes an input
document with the hash value of the input document as an
encode key. The ciphertext is transmitted to the server and
the customer keeps the encode key. Since concurrent
encryption is imperative, alike documents are encoded into
equivalent ciphertext, despite of who encodes them. Thus,
the distributed repository server can carry out deduplication
over the encoded document. and all proprietors of the
document can retrieve the encoded document (after
executing the proof-of-proprietorship convention) and
decode it subsequently since they possess the identical
encode key for the document.
In the case of ownership repudiation, assume numerous
customers possess proprietorship of a ciphertext deployed in
distributed repository. With passage of time, a few of the
customers might demand the distributed server to remove or
alter their documents, and the server removes the
proprietorship information of the customers from the
proprietorship list for the equivalent documents. Then, the
repudiated customers are prohibited from retrieving the
documents saved in the distributed repository after the
deletion or alteration inquiry (forward privacy).
VASD
2
OM: Virtual Auditing and Secure
Deduplication with Dynamic Ownership
Management in Cloud
Geeta C M, Nikhil R C, Raghavendra S, Rajkumar Buyya, Venugopal K R