An Efficient Secure Protocol for integrity checking of data files outsourced to remote server

De-duplication is being widely applied for avoiding storage wasting overhead within the cloud. Information integrity confirmation with de-duplication cannot solely save house of cloud server however conjointly guarantee safe future of the kept information. within the hand of integrity verification,...

Full description

Saved in:
Bibliographic Details
Published in2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on pp. 666 - 670
Main Authors Kireeti, K., Kiranmayee, B.V., Nagini, S.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract De-duplication is being widely applied for avoiding storage wasting overhead within the cloud. Information integrity confirmation with de-duplication cannot solely save house of cloud server however conjointly guarantee safe future of the kept information. within the hand of integrity verification, de-duplications field uniten enforced by the cloud file server. The impressions of all file info blocks are set-up and commissioned into cloud servers. Once acquiring the block info and marks, the server contrasts got marks and alsothe put away marks. If there's a mark that had an indistinguishable incentive from some put away signature, the infogot mark and information square won't be put away by the cloud's the clserver. Something different, the cloudServer stores each and every got stamp and data squares. Honestly, these errands brings a gigantic computational cost. To tackle this disadvantage, we tend to propose an information honesty check topic with de-duplication. amid this theme, the de-duplication is executed by cloud end user, which might avoid further communicatory with including machine prices. The analysis interpretation signifies that our's integrity theme is workable for substantial utilization scenario. We now exhibit that the planned plot fulfills impression unforgeability, and vindictive clients can't acquire any real document from the cloud storage server as misleading.
AbstractList De-duplication is being widely applied for avoiding storage wasting overhead within the cloud. Information integrity confirmation with de-duplication cannot solely save house of cloud server however conjointly guarantee safe future of the kept information. within the hand of integrity verification, de-duplications field uniten enforced by the cloud file server. The impressions of all file info blocks are set-up and commissioned into cloud servers. Once acquiring the block info and marks, the server contrasts got marks and alsothe put away marks. If there's a mark that had an indistinguishable incentive from some put away signature, the infogot mark and information square won't be put away by the cloud's the clserver. Something different, the cloudServer stores each and every got stamp and data squares. Honestly, these errands brings a gigantic computational cost. To tackle this disadvantage, we tend to propose an information honesty check topic with de-duplication. amid this theme, the de-duplication is executed by cloud end user, which might avoid further communicatory with including machine prices. The analysis interpretation signifies that our's integrity theme is workable for substantial utilization scenario. We now exhibit that the planned plot fulfills impression unforgeability, and vindictive clients can't acquire any real document from the cloud storage server as misleading.
Author Kiranmayee, B.V.
Nagini, S.
Kireeti, K.
Author_xml – sequence: 1
  givenname: K.
  surname: Kireeti
  fullname: Kireeti, K.
  organization: CSE Dept, VNRVJIET
– sequence: 2
  givenname: B.V.
  surname: Kiranmayee
  fullname: Kiranmayee, B.V.
  organization: CSE Dept, VNRVJIET
– sequence: 3
  givenname: S.
  surname: Nagini
  fullname: Nagini, S.
  organization: CSE Dept, VNRVJIET
BookMark eNotz8FKAzEQgOEICtraJ-hlXmBrZmeT3R5LqVqoKKxXKdnspEa3G0lSoW_vwZ7-2wf_RFyPYWQh5igXiHL5sC3al9V6UUpsFo1WVDd0JSaoqNFYVSXeillKX1LKUjekdHknPlYjbJzz1vOYoWV7igxvMeRgwwAuRPBj5kP0-Qz2k-23Hw8QHPQmG3B-4AThlFM4Rcs95ACRjyEzJI6_HO_FjTND4tmlU9E-bt7Xz8Xu9Wm7Xu0Kv5S50KxqjVbrjglLpLpzrneGudPKUM0VmWVjVU_UaYeyNqpSndJkTI-SkaZi_q96Zt7_RH808by__NMfG-NUoQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/I-SMAC.2018.8653783
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1538614421
9781538614426
EndPage 670
ExternalDocumentID 8653783
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-6e5761c66be312137bffdfaeeb65a37e43a98c5d33b6f107a545b563aad10e13
IEDL.DBID RIE
IngestDate Thu Jun 29 18:39:19 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-6e5761c66be312137bffdfaeeb65a37e43a98c5d33b6f107a545b563aad10e13
PageCount 5
ParticipantIDs ieee_primary_8653783
PublicationCentury 2000
PublicationDate 2018-Aug.
PublicationDateYYYYMMDD 2018-08-01
PublicationDate_xml – month: 08
  year: 2018
  text: 2018-Aug.
PublicationDecade 2010
PublicationTitle 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on
PublicationTitleAbbrev I-SMAC
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002683562
Score 1.712542
Snippet De-duplication is being widely applied for avoiding storage wasting overhead within the cloud. Information integrity confirmation with de-duplication cannot...
SourceID ieee
SourceType Publisher
StartPage 666
SubjectTerms Cloud computing
Conferences
Cryptography
Data integrity verification
Data Procession Checking
Dynamic data Operations
dynamic de-duplication
Homomorphical Hashing Function
Instruments
Servers
SHA-256
Task analysis
Title An Efficient Secure Protocol for integrity checking of data files outsourced to remote server
URI https://ieeexplore.ieee.org/document/8653783
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB3anjxVbcVv9uDRpEn3I9ljKS1VqAhV6EXKbnYWREikJhd_vbtJWlE8eAuBTcJOwrx5efMG4Mai4g5Y2IBznrkCJZaBVlEUMKEiqVLKxpnvRl4-iMUzu1_zdQdu970wiFiLzzD0h_W_fFNklafKRqngNElpF7qJlE2v1p5PGQuHJcS4NRaKIzm6C1bLydSrt9KwXfljhEqdQeZ9WO7u3QhH3sKq1GH2-cuW8b8PdwjD71498rjPQkfQwfwY-rthDaT9dgfwMsnJrPaLcJchNc1eLywL9yoQB11J4xzhUDlxgcw8hU4KS7yElHj3pg9SVGXD9RtSFmSLLspIPKuL2yGs5rOn6SJoZysErzIqA4GuzogzITRSb-qWaGuNVYhacEUTZFTJNOOGUi2sqxCVA1qaC6qUiSOM6Qn08iLHUyDCpTPJGLIYE6YYKkG1pdQYmSJXaM5g4Pdq896YZ2zabTr_-_QFHPh4NQq7S-iV2wqvXNYv9XUd7i9VNa61
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB1qPeipait-uwePpk26H0mOpbS02hShFXqRspudgAiJ1OTir3c3SSuKB28hsEnYSZg3L2_eANwlKLkBFonDOY9NgeKFjpKu6zAh3VAGlPVj240czcXkmT2s-KoB97teGEQsxWfYtYflv3ydxYWlynqB4NQP6B7sG1wdiKpba8eo9IVBE6JfWwt5btibOotoMLT6raBbr_0xRKXMIeMWRNu7V9KRt26Rq278-cuY8b-PdwSd72498rTLQ8fQwPQEWttxDaT-etvwMkjJqHSMMJchJdFeLswz8zIQA15J5R1hcDkxoYwtiU6yhFgRKbH-TR8kK_KK7dckz8gGTZyRWF4XNx1YjEfL4cSppys4r6GbOwJNpeHFQiik1tbNV0miE4moBJfUR0ZlGMRcU6pEYmpEaaCW4oJKqT0XPXoKzTRL8QyIMAktZAyZhz6TDKWgKqFU6zBALlGfQ9vu1fq9ss9Y19t08ffpWziYLKPZejadP17CoY1dpbe7gma-KfDaYIBc3ZSh_wKijLIA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+2nd+International+Conference+on+I-SMAC+%28IoT+in+Social%2C+Mobile%2C+Analytics+and+Cloud%29+%28I-SMAC%29I-SMAC+%28IoT+in+Social%2C+Mobile%2C+Analytics+and+Cloud%29+%28I-SMAC%29%2C+2018+2nd+International+Conference+on&rft.atitle=An+Efficient+Secure+Protocol+for+integrity+checking+of+data+files+outsourced+to+remote+server&rft.au=Kireeti%2C+K.&rft.au=Kiranmayee%2C+B.V.&rft.au=Nagini%2C+S.&rft.date=2018-08-01&rft.pub=IEEE&rft.spage=666&rft.epage=670&rft_id=info:doi/10.1109%2FI-SMAC.2018.8653783&rft.externalDocID=8653783