Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 19
Page No. 3801 - 3809

A Secured Proof of Ownership and Enhanced Deduplication Scheme for Cloud Storage

Authors : S. Umamaheswari, T. Purusothaman, N P. Supriya and Arun Thundyill Saseendran

References

Bloom, B.H., 1970. Space-time trade-offs in hash coding with allowable errors. Commun. ACM., 13: 422-426.
CrossRef  |  Direct Link  |  

DiPietro, R. and A. Sorniotti, 2012. Boosting efficiency and security in proof of ownership for deduplication. Proceedings of the 7th ACM Symposium on Information Computer and Communications Security, May 2-4, 2012, ACM, Korea, ISBN: 978-1-4503-1648-4, pp: 81-82.

Geravand, S. and M. Ahmadi, 2013. Bloom filter applications in network security: A state-of-the-art survey. Comput. Networks, 57: 4047-4064.
Direct Link  |  

Halevi, S., D. Harnik, B. Pinkas and A. Shulman-Peleg, 2011. Proofs of ownership in remote storage systems. Proceedings of the 18th ACM Conference on Computer and Communications Security, October 17-21, 2011, Chicago, IL., USA., pp: 491-500.

Harnik, D., B. Pinkas and A. Shulman-Peleg, 2010. Side channels in cloud services: Deduplication in cloud storage. IEEE Secur. Privacy, 8: 40-47.
CrossRef  |  

Keelveedhi, S., M. Bellare and T. Ristenpart, 2013. Dupless: Server-aided encryption for deduplicated storage. Proceedings of the 22nd USENIX Symposium on Presented as Part of the Security (USENIX Security 13), August 14-16, 2013, Usenix Publications, Washington, USA., ISB N: 978 -1-931971-03-4, pp: 179-194.

Merkle, R.C., 1989. A Certified Digital Signature. In: Advances In Cryptology-CRYPTO 89, Brassard, G., (Ed.), LNCS 435, Springer-Verlag, Berlin, pp: 218-238.

Sookhak, M., H. Talebian, E. Ahmed, A. Gani and M.K. Khan, 2014. A review on remote data auditing in single cloud server: Taxonomy and open issues. J. Network Comput. Appl., 43: 121-141.
Direct Link  |  

Zheng, Q. and S. Xu, 2012. Secure and efficient proof of storage with deduplication. Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, February 7-9, 2012, San Antonio, TX., USA., pp: 1-12.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved