scholarly journals DeyPoS-homomorphism authenticated tree (HAT) for multi-user locality in cloud storage

2018 ◽  
Vol 7 (2.31) ◽  
pp. 141
Author(s):  
M Muthu Selvam ◽  
K Mariappan ◽  
G V. Sriramakrishnan ◽  
G Suseendran

The technology PoS (Dynamic Proof of storage) is a cryptographic primordial allows a abuser to test the reliability of subcontracted documents and effectively replace documents in the cloud storage system. Despite the fact that investigators have projected several dynamic proofs of storage designs in distinct client settings, hassle in the multi-client settings have now not been examined adequately. In sensible multi-client cloud server storage space wishes a cozy client part cross client system of deduplication, it permits client toward bypass importing manner as well as gain instantly the rights of the files, while different vendors of the same files hold uploaded to the cloud system server. In the direction of familiarity not a bit of prevailing dynamic Proof of Storages can guide this system. This research article  we are bring the model of dynamic proof of storage in deduplicatable system and endorse a green creation known as Dedupicatable Dynamic Proof of Storage (DeyPoS), on the way to attain DeyPoS and comfy  reduplication concurrently in cross client. Taking into account confront of formation assortment and personal blot creation make use of a new tool called HAT (Homomorphic Authenticated Tree). Also verify precautions of creation and the hypothetical, investigational outcomes shows that the creation is green in use. 

2013 ◽  
Vol 464 ◽  
pp. 358-364
Author(s):  
Bing Jiang ◽  
Guo Yu Ma ◽  
Sheng Ma ◽  
Jian Feng Xie

This paper introduces the client design based on Android mobile sync of cloud storage system, including system architecture and its module design. Through the Android mobile sync client software, user can access the cloud server to implement some functions, such as upload and download, data backup and restore, file management and sharing in the distance. Under the LAN environment, the client system has successfully completed the tests of both function module and assembly verification. The results show that the whole system runs in good condition.


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 01) ◽  
pp. 288-301
Author(s):  
G. Sujatha ◽  
Dr. Jeberson Retna Raj

Data storage is one of the significant cloud services available to the cloud users. Since the magnitude of information outsourced grows extremely high, there is a need of implementing data deduplication technique in the cloud storage space for efficient utilization. The cloud storage space supports all kind of digital data like text, audio, video and image. In the hash-based deduplication system, cryptographic hash value should be calculated for all data irrespective of its type and stored in the memory for future reference. Using these hash value only, duplicate copies can be identified. The problem in this existing scenario is size of the hash table. To find a duplicate copy, all the hash values should be checked in the worst case irrespective of its data type. At the same time, all kind of digital data does not suit with same structure of hash table. In this study we proposed an approach to have multiple hash tables for different digital data. By having dedicated hash table for each digital data type will improve the searching time of duplicate data.


2021 ◽  
Author(s):  
Nastaran Chakani ◽  
Seyed Masoud Mirrezaei ◽  
Ghosheh Abed Hodtani

Abstract Outsourcing data on the cloud storage services has already attracted great attention due to prospect of rapid data growth and storing efficiencies for customers. The coding-based cloud storage approach can offer more reliable and faster solution with less storage space in comparison with replication-based cloud storage. LT codes as a famous member of rateless codes family can improve performance of storage systems utilizing good degree distributions. Since degree distribution plays key role in LT codes performance, recently introduced Poisson Robust Soliton Distribution (PRSD) and Combined Poisson Robust Soliton Distribution (CPRSD) motivate us to investigate LT codes-based cloud storage system. So, we exploit LT codes with new degree distributions in order to provide lower average degree and higher decoding efficiency, specifically when receiving fewer encoding symbols, comparing with popular degree distribution, Robust Soliton Distribution (RSD). In this paper, we show that proposed cloud storage outperforms traditional ones in terms of storage space and robustness encountering unavailability of encoding symbols, due to compatible properties of PRSD and CPRSD with cloud storage essence. Furthermore, modified decoding process based on required encoding symbols behavior is presented to reduce data retrieval time. Numerical results confirm improvement of cloud storage performance.


2014 ◽  
Vol 556-562 ◽  
pp. 6179-6183
Author(s):  
Zhi Gang Chai ◽  
Ming Zhao ◽  
Xiao Yu

With the rapid development of information technology, the extensive use of cloud computing promotes technological change in the IT industry. The use of cloud storage industry is also one solution to the problem of an amount of data storing, which is traditionally large, and unimaginably redundant. The use of cloud computing in the storage system connects the user's data with network clients via the Internet. That is to say, it not only solves a lot of data storage space requirements in request, but also greatly reduces the cost of the storage system. But in the application of cloud storage, there are also many problems to be solved, even to some extent which has hindered the development of cloud storage. Among these issues, the most concerning one is cloud storage security. The following passages discuss the problem and propose a solution to it.


2020 ◽  
Vol 17 (4) ◽  
pp. 1937-1942
Author(s):  
S. Sivasankari ◽  
V. Lavanya ◽  
G. Saranya ◽  
S. Lavanya

These days, Cloud storage is gaining importance among individual and institutional users. Individual and foundations looks for cloud server as a capacity medium to diminish their capacity load under nearby devices. In such storage services, it is necessary to avoid duplicate content/repetitive storage of same data to be avoided. By reducing the duplicate content in cloud storage reduces storage cost. De-duplication is necessary when multiple data owner outsource the same data, issues related to security and ownership to be considered. As the cloud server is always considered to be non trusted, as it is maintained by third party, thus the data stored in cloud is always encrypted and uploaded, thus randomization property of encryption affects de-duplication. It is necessary to propose a serverside de-duplication scheme for handling encrypted data. The proposed scheme allows the cloud server to control access to outsourced data even when the ownership changes dynamically.


Author(s):  
Anindita Sarkar Mondal ◽  
Anirban Mukhopadhyay ◽  
Samiran Chattopadhyay

AbstractAn object-based cloud storage system is a storage platform where big data is managed through the internet and data is considered as an object. A smart storage system should be able to handle the big data variety property by recommending the storage space for each data type automatically. Machine learning can help make a storage system automatic. This article proposes a classification engine framework for this purpose by utilizing a machine learning strategy. A feature selection approach wrapped with a classifier is proposed to automatically predict the proper storage space for the incoming big data. It helps build an automatic storage space recommendation system for an object-based cloud storage platform. To find out a suitable combination of feature selection algorithms and classifiers for the proposed classification engine, a comparative study of different supervised feature selection algorithms (i.e., Fisher score, F-score, Lll21) from three categories (similarity, statistical, sparse learning) associated with various classifiers (i.e., SVM, K-NN, Neural Network) is performed. We illustrate our study using RSoS system as it provides a cloud storage platform for the healthcare data as experimental big data by considering its variety property. The experiments confirm that Lll21 feature selection combined with K-NN classifier provides better performance than the others.


2013 ◽  
Vol 717 ◽  
pp. 789-793
Author(s):  
Jun Wei Ge ◽  
Ai Hua Miao ◽  
Yi Qiu Fang

Erasure codes received extensive attention in the cloud storage system because of its effective on saving storage space,However, due to the high recovery-overhead of erasure code, its application has been limited in these storage systems.For these problems,in this paper,we presents A multi-server Erasure code algorithm based on the degree of restriction to reduce the recovery-overhead from the restriction of date and parity's degree,and enhance the system performance to a certain extent ,ensure the reliability of the data of the cloud storage environment.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Haibin Yang ◽  
Zhengge Yi ◽  
Xu An Wang ◽  
Yunxuan Su ◽  
Zheng Tu ◽  
...  

Now, it is common for patients and medical institutions to outsource their data to cloud storage. This can greatly reduce the burden of medical information management and storage and improve the efficiency of the entire medical industry. In some cases, the group-based cloud storage system is also very common to be used. For example, in an medical enterprise, the employees outsource the working documents to the cloud storage and share them to the colleagues. However, when the working documents are outsourced to the cloud servers, how to ensure their security is a challenge problem for they are not controlled physically by the data owners. In particular, the integrity of the outsourced data should be guaranteed. And the secure cloud auditing protocol is designed to solve this issue. Recently, a lightweight secure auditing scheme for shared data in cloud storage is proposed. Unfortunately, we find this proposal not secure in this paper. It’s easy for the cloud server to forge the authentication label, and thus they can delete all the outsourced data when the cloud server still provide a correct data possession proof, which invalidates the security of the cloud audit protocol. On the basis of the original security auditing protocol, we provide an improved one for the shared data, roughly analysis its security, and the results show our new protocol is secure.


Author(s):  
K.Makanyadevi, Et. al.

In recent years there are many researchers conducted regarding with cloud storage benefits and its efficiency improvements, but all are raising a question regarding the effectiveness and privacy. The effectiveness of the cloud storage system purely depends on the storage capacity and responsiveness of the server, in which the size of the data is large automatically the responsiveness of the storage server goes down. To avoid this issue many researchers found a lots of solution such as multiple cloud server placements, the local cloud farm fixation and so on. But all are coming too struck with the privacy issues and the security threats are more in the case of such things. These issues need to be resolved with one powerful mechanism as well as providing a good storage mechanism without any security threats. In this paper, a healthcare application is taken into consideration and introduce a new fog based cloud storage system is designed such as Intelligent Fog based Cloud Strategy using Edge Devices (IFCSED), in which this Fog Computing process provides an efficient health data storage structure to the cloud server to maintain the high priority records without considering on regular or non-prioritized records. This proposed strategy follows Edge-based Fog assistance to identify the healthcare data priority utilizing analyzing the records, identify the priority level and classify those priority records from the data and pass that to the remote cloud server as well as keep the remaining non-prioritized records into the local fog server. The fog server data can be back up with every point of interval using data backup logics. These backup assures the data protection and the integrity on the storage medium as well as the proposed approach of IFCSED eliminates the processing delay by using time complexity estimations. The data which is coming from Internet of Things (IoT) based real-world health record will be acquired by using controllers and other related devices, which will be delivered to the Edge Devices for manipulation. In this Edge processing device accumulates the incoming health data and classifies that based on the prioritization logic. The health sensor data which is coming in regular interval with normal sensor values are considered to be the regular non-prioritized data and the health sensor data coming up with some abnormal contents such as mismatched heart rate, increased pressure level and so on are considered as a the prioritized record. The sensor assisted health data will low-priority will be moved to the fog server, which is locally maintained into the environment itself and the sensor assisted health data coming up with high priority will be moved into the remote cloud server. The proposed approach assures the time efficiency, reduction in data loss, data integrity and the storage efficiency, as well as these things, will be proved over the resulting sections with proper graphical results.  


Sign in / Sign up

Export Citation Format

Share Document