scholarly journals Big File Cloud Storage (BFCS): Distributed Storage Service with De-Duplication and Secure Storage

2016 ◽  
Vol 5 (1) ◽  
pp. 573-576
Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


2016 ◽  
Vol 24 (2) ◽  
pp. 57-74 ◽  
Author(s):  
Chen-Shu Wang ◽  
Cheng-Yu Lai ◽  
Shiang-Lin Lin

In recent year, mobile devices have become an indispensable product in our daily life. Extensive amount of mobile applications (Apps) have been developed and used on these devices. Restated, in terms of the Apps future development and popularization, to understand why people have willingness to pay for use certain Apps has apparently became an important issue. However, there are various homogeneity Apps, which people can easily find some free succedaneum for use. Consequently, it would be an interesting issue to realize individual's intention to pay for use the Apps. In this study, the authors conducted a survey in Taiwan to realize individuals' willingness to pay for Cloud Storage Service (CSS), since CSS is one of the frequently adopted App for most mobile device users. The results show that both the perceived service quality and conformity positively affect the perceived value and then increases the user's willingness to pay indirectly. In addition, the findings also support that the users' product knowledge about CSS produce negative moderating effects on the perceived value and the willingness of pay.


2017 ◽  
pp. 197-219 ◽  
Author(s):  
Surya Nepal ◽  
Shiping Chen ◽  
Jinhui Yao

2019 ◽  
pp. 1393-1407
Author(s):  
R. Deepthi Crestose Rebekah ◽  
Dhanaraj Cheelu ◽  
M. Rajasekhara Babu

Cloud computing is one of the most exciting technologies due to its ability to increase flexibility and scalability for computer processes, while reducing cost associated with computing. It is important to share the data securely, efficiently, and flexibly in cloud storage. Existing data protection mechanisms such as symmetric encryption techniques are unsuccessful in preventing data sharing securely. This article suggests Key aggregate cryptosystem which produce constant size ciphertexts in order to delegate decryption rights for any set of ciphertexts. The uniqueness is that one can aggregate any number of secret keys and make them as compact as a single key. This compact aggregate key can be easily sent to others with very limited secure storage.


2018 ◽  
Vol 10 (4) ◽  
pp. 43-66 ◽  
Author(s):  
Shubhanshi Singhal ◽  
Pooja Sharma ◽  
Rajesh Kumar Aggarwal ◽  
Vishal Passricha

This article describes how data deduplication efficiently eliminates the redundant data by selecting and storing only single instance of it and becoming popular in storage systems. Digital data is growing much faster than storage volumes, which shows the importance of data deduplication among scientists and researchers. Data deduplication is considered as most successful and efficient technique of data reduction because it is computationally efficient and offers a lossless data reduction. It is applicable to various storage systems, i.e. local storage, distributed storage, and cloud storage. This article discusses the background, components, and key features of data deduplication which helps the reader to understand the design issues and challenges in this field.


2019 ◽  
Vol 15 (4) ◽  
pp. 155014771984127 ◽  
Author(s):  
Gang Yu ◽  
Yongjuan Wang ◽  
Zhenfu Cao ◽  
Jian Lin ◽  
Xiangyu Wang

Sign in / Sign up

Export Citation Format

Share Document