International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-6, March 2020 5504 Retrieval Number: F7825038620/2020©BEIESP DOI:10.35940/ijrte.F7825.038620 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Abstract: In cloud repository amenities, deduplication technology is often utilized to minimize the volume and bandwidth by removing repetitious information and caching only a solitary duplicate of them. Deduplication is extremely productive when many customers deploy the identical information to the cloud repository, but it aggrevates problems pertaining to safety and proprietorship. Proof-of-ownership mechanism authorize any possessor of an identical information to approve to the cloud repository server that he possess the information in a dynamic way. In repository utilities with enormous information, the repository servers may want to minimize the capacity of cached information, and the customers desires to examine the integrity of their information with a reasonable cost. Aiming at realizing integrity auditing and deduplication with effective proprietorship administration of information in the cloud, we propose Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud (VASD 2 OM) mechanism. It empowers the distributed server to limit access to the deployed information though the proprietorship transforms actively. Further, the mechanism supports safe and effective virtual auditing of the documents during the download process. In addition, the proposed mechanism lowers the burden of dataowner to audit documents by himself and there is no need to authorize auditing to a Third Party Auditor (TPA). Experimental results demonstrate that the virtual auditing has low auditing time cost relative to the existing public auditing schemes. Keywords: Cloud storage, Deduplication, Encryption, Proof- of-Ownership, Revocation, Virtual auditing. I. INTRODUCTION Cloud computing delivers extensible, inexpensive and location-independent online facilities extending from simple backup facilities to distributed repository frameworks. Now a days optical networks [1], [2] have been deployed all over the globe for efficient information communication. The rapid expansion of information capacity stockpiled in the distributed repository has compelled to a rising need for procedures for conserving disk capacity and network bandwidth. Revised Manuscript Received on March 30, 2020. Geeta C Mara*, CSE, University Visvesvaraya College of Engg, Bangalore University, Bangalore, India. Email: geetacmara@gmail.com Nikhil R C, ASE, Jain University, Bengaluru, India. Email:nikhilrc1504@gmail.com Raghavendra S, CSE,University Visvesvaraya College of Engg, Bangalore University, Bangalore, India. Email: raghush86@gmail.com Rajkumar Buyya, CSE, The University of Melbourne, Australia.Email:rbuyya@unimelb.edu.au Venugopal K R, Bangalore University, Bangalore, India. Email: venugopalkr@gmail.com To minimize resource utilization, various distributed repository utilities, such as Dropbox [3], Google Drive [4], make use of deduplication procedure, where the distributed repository saves one solitary duplicate of repetitious information and furnishes links to the copy rather than of saving other genuine copies of that information, irrespective of the number of customers request to save the information. In order to secure their personal information from unapproved external attackers and from the Cloud Service Provider (CSP) [5], customers encode their documents before deploying to the distant server. While, traditional encryption cannot be used to carry out deduplication due to the following reasons; Deduplication method takes benefit of information equivalence to recognize the identical information and decrease the repository capacity. On the contrary, the cryptographic algorithms shuffle the encoded documents in order to make ciphertext equivalent from theoretically random information. Encryption of the identical documents by distinct customers with distinct encryption keys results in distinct ciphertexts makes it critical for the distributed server to determine if the plaintext are identical and deduplicate them. Concurrent encryption [6] solves this issue successfully. The concurrent encryption algorithm encodes an input document with the hash value of the input document as an encode key. The ciphertext is transmitted to the server and the customer keeps the encode key. Since concurrent encryption is imperative, alike documents are encoded into equivalent ciphertext, despite of who encodes them. Thus, the distributed repository server can carry out deduplication over the encoded document. and all proprietors of the document can retrieve the encoded document (after executing the proof-of-proprietorship convention) and decode it subsequently since they possess the identical encode key for the document. In the case of ownership repudiation, assume numerous customers possess proprietorship of a ciphertext deployed in distributed repository. With passage of time, a few of the customers might demand the distributed server to remove or alter their documents, and the server removes the proprietorship information of the customers from the proprietorship list for the equivalent documents. Then, the repudiated customers are prohibited from retrieving the documents saved in the distributed repository after the deletion or alteration inquiry (forward privacy). VASD 2 OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud Geeta C M, Nikhil R C, Raghavendra S, Rajkumar Buyya, Venugopal K R