scholarly journals VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof

Author(s):  
Xixun Yu ◽  
Hui Bai ◽  
Zheng Yan ◽  
Rui Zhang
2018 ◽  
Vol Volume-2 (Issue-3) ◽  
pp. 1734-1739
Author(s):  
Lingeshwaran. B ◽  
Tamilselvan. V ◽  
Vigneshwaran. V ◽  

2020 ◽  
Vol 91 ◽  
pp. 101730
Author(s):  
Xueqin Liang ◽  
Zheng Yan ◽  
Robert H. Deng

2021 ◽  
Vol 32 (3) ◽  
pp. 587-600
Author(s):  
Xueqin Liang ◽  
Zheng Yan ◽  
Robert H. Deng ◽  
Qinghua Zheng

Author(s):  
Vishal Passricha ◽  
Ashish Chopra ◽  
Shubhanshi Singhal

Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS but this causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is an effective data reduction technique. The dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However, this method affects the deduplication process because encryption methods have varying characteristics. A convergent encryption (CE) scheme is widely used for secure data deduplication. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This article addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.


The widespread adoption of multi-cloud in enterprises is one of the root causes of cost-effectiveness. Cloud service providers reduce storage costs through advanced data de-duplication, which also provides vulnerabilities for attackers. Traditional approaches to authentication and data security for a single cloud need to be upgraded to be best suitable for cloud-to-cloud data migration security in order to mitigate the impact of dictionary and template attacks on authentication and data integrity, respectively. This paper proposes a scheme of user layer authentication along with lightweight cryptography. The proposed simulates its mathematical model to analyze the behavioral pattern of time-complexity of data security along with user auth protection. The performance pattern validates the model for scalability and reliability against both authentication and data integrity.


Author(s):  
Xueqin Liang ◽  
Zheng Yan ◽  
Robert H. Deng ◽  
Raimo Kantola ◽  
Wenxiu Ding ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document