An Efficient Secure Protocol for integrity checking of data files outsourced to remote server
De-duplication is being widely applied for avoiding storage wasting overhead within the cloud. Information integrity confirmation with de-duplication cannot solely save house of cloud server however conjointly guarantee safe future of the kept information. within the hand of integrity verification,...
Saved in:
Published in | 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on pp. 666 - 670 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | De-duplication is being widely applied for avoiding storage wasting overhead within the cloud. Information integrity confirmation with de-duplication cannot solely save house of cloud server however conjointly guarantee safe future of the kept information. within the hand of integrity verification, de-duplications field uniten enforced by the cloud file server. The impressions of all file info blocks are set-up and commissioned into cloud servers. Once acquiring the block info and marks, the server contrasts got marks and alsothe put away marks. If there's a mark that had an indistinguishable incentive from some put away signature, the infogot mark and information square won't be put away by the cloud's the clserver. Something different, the cloudServer stores each and every got stamp and data squares. Honestly, these errands brings a gigantic computational cost. To tackle this disadvantage, we tend to propose an information honesty check topic with de-duplication. amid this theme, the de-duplication is executed by cloud end user, which might avoid further communicatory with including machine prices. The analysis interpretation signifies that our's integrity theme is workable for substantial utilization scenario. We now exhibit that the planned plot fulfills impression unforgeability, and vindictive clients can't acquire any real document from the cloud storage server as misleading. |
---|---|
AbstractList | De-duplication is being widely applied for avoiding storage wasting overhead within the cloud. Information integrity confirmation with de-duplication cannot solely save house of cloud server however conjointly guarantee safe future of the kept information. within the hand of integrity verification, de-duplications field uniten enforced by the cloud file server. The impressions of all file info blocks are set-up and commissioned into cloud servers. Once acquiring the block info and marks, the server contrasts got marks and alsothe put away marks. If there's a mark that had an indistinguishable incentive from some put away signature, the infogot mark and information square won't be put away by the cloud's the clserver. Something different, the cloudServer stores each and every got stamp and data squares. Honestly, these errands brings a gigantic computational cost. To tackle this disadvantage, we tend to propose an information honesty check topic with de-duplication. amid this theme, the de-duplication is executed by cloud end user, which might avoid further communicatory with including machine prices. The analysis interpretation signifies that our's integrity theme is workable for substantial utilization scenario. We now exhibit that the planned plot fulfills impression unforgeability, and vindictive clients can't acquire any real document from the cloud storage server as misleading. |
Author | Kiranmayee, B.V. Nagini, S. Kireeti, K. |
Author_xml | – sequence: 1 givenname: K. surname: Kireeti fullname: Kireeti, K. organization: CSE Dept, VNRVJIET – sequence: 2 givenname: B.V. surname: Kiranmayee fullname: Kiranmayee, B.V. organization: CSE Dept, VNRVJIET – sequence: 3 givenname: S. surname: Nagini fullname: Nagini, S. organization: CSE Dept, VNRVJIET |
BookMark | eNotz8FKAzEQgOEICtraJ-hlXmBrZmeT3R5LqVqoKKxXKdnspEa3G0lSoW_vwZ7-2wf_RFyPYWQh5igXiHL5sC3al9V6UUpsFo1WVDd0JSaoqNFYVSXeillKX1LKUjekdHknPlYjbJzz1vOYoWV7igxvMeRgwwAuRPBj5kP0-Qz2k-23Hw8QHPQmG3B-4AThlFM4Rcs95ACRjyEzJI6_HO_FjTND4tmlU9E-bt7Xz8Xu9Wm7Xu0Kv5S50KxqjVbrjglLpLpzrneGudPKUM0VmWVjVU_UaYeyNqpSndJkTI-SkaZi_q96Zt7_RH808by__NMfG-NUoQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/I-SMAC.2018.8653783 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 1538614421 9781538614426 |
EndPage | 670 |
ExternalDocumentID | 8653783 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IL 6IN AAJGR ABLEC ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-6e5761c66be312137bffdfaeeb65a37e43a98c5d33b6f107a545b563aad10e13 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:39:19 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-6e5761c66be312137bffdfaeeb65a37e43a98c5d33b6f107a545b563aad10e13 |
PageCount | 5 |
ParticipantIDs | ieee_primary_8653783 |
PublicationCentury | 2000 |
PublicationDate | 2018-Aug. |
PublicationDateYYYYMMDD | 2018-08-01 |
PublicationDate_xml | – month: 08 year: 2018 text: 2018-Aug. |
PublicationDecade | 2010 |
PublicationTitle | 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on |
PublicationTitleAbbrev | I-SMAC |
PublicationYear | 2018 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0002683562 |
Score | 1.712542 |
Snippet | De-duplication is being widely applied for avoiding storage wasting overhead within the cloud. Information integrity confirmation with de-duplication cannot... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 666 |
SubjectTerms | Cloud computing Conferences Cryptography Data integrity verification Data Procession Checking Dynamic data Operations dynamic de-duplication Homomorphical Hashing Function Instruments Servers SHA-256 Task analysis |
Title | An Efficient Secure Protocol for integrity checking of data files outsourced to remote server |
URI | https://ieeexplore.ieee.org/document/8653783 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB3anjxVbcVv9uDRpEn3I9ljKS1VqAhV6EXKbnYWREikJhd_vbtJWlE8eAuBTcJOwrx5efMG4Mai4g5Y2IBznrkCJZaBVlEUMKEiqVLKxpnvRl4-iMUzu1_zdQdu970wiFiLzzD0h_W_fFNklafKRqngNElpF7qJlE2v1p5PGQuHJcS4NRaKIzm6C1bLydSrt9KwXfljhEqdQeZ9WO7u3QhH3sKq1GH2-cuW8b8PdwjD71498rjPQkfQwfwY-rthDaT9dgfwMsnJrPaLcJchNc1eLywL9yoQB11J4xzhUDlxgcw8hU4KS7yElHj3pg9SVGXD9RtSFmSLLspIPKuL2yGs5rOn6SJoZysErzIqA4GuzogzITRSb-qWaGuNVYhacEUTZFTJNOOGUi2sqxCVA1qaC6qUiSOM6Qn08iLHUyDCpTPJGLIYE6YYKkG1pdQYmSJXaM5g4Pdq896YZ2zabTr_-_QFHPh4NQq7S-iV2wqvXNYv9XUd7i9VNa61 |
link.rule.ids | 310,311,783,787,792,793,799,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB1qPeipait-uwePpk26H0mOpbS02hShFXqRspudgAiJ1OTir3c3SSuKB28hsEnYSZg3L2_eANwlKLkBFonDOY9NgeKFjpKu6zAh3VAGlPVj240czcXkmT2s-KoB97teGEQsxWfYtYflv3ydxYWlynqB4NQP6B7sG1wdiKpba8eo9IVBE6JfWwt5btibOotoMLT6raBbr_0xRKXMIeMWRNu7V9KRt26Rq278-cuY8b-PdwSd72498rTLQ8fQwPQEWttxDaT-etvwMkjJqHSMMJchJdFeLswz8zIQA15J5R1hcDkxoYwtiU6yhFgRKbH-TR8kK_KK7dckz8gGTZyRWF4XNx1YjEfL4cSppys4r6GbOwJNpeHFQiik1tbNV0miE4moBJfUR0ZlGMRcU6pEYmpEaaCW4oJKqT0XPXoKzTRL8QyIMAktZAyZhz6TDKWgKqFU6zBALlGfQ9vu1fq9ss9Y19t08ffpWziYLKPZejadP17CoY1dpbe7gma-KfDaYIBc3ZSh_wKijLIA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+2nd+International+Conference+on+I-SMAC+%28IoT+in+Social%2C+Mobile%2C+Analytics+and+Cloud%29+%28I-SMAC%29I-SMAC+%28IoT+in+Social%2C+Mobile%2C+Analytics+and+Cloud%29+%28I-SMAC%29%2C+2018+2nd+International+Conference+on&rft.atitle=An+Efficient+Secure+Protocol+for+integrity+checking+of+data+files+outsourced+to+remote+server&rft.au=Kireeti%2C+K.&rft.au=Kiranmayee%2C+B.V.&rft.au=Nagini%2C+S.&rft.date=2018-08-01&rft.pub=IEEE&rft.spage=666&rft.epage=670&rft_id=info:doi/10.1109%2FI-SMAC.2018.8653783&rft.externalDocID=8653783 |