Abstract
As cloud computing technology becomes the major storage and sharing of data in Internet era, outsourcing cloud server for storing data becomes the latest trend. All small business and major social networking sites rely on cloud storage for dynamic data storage. Storing and maintaining cloud data are not easy, it require lots of effort and space to manage cloud data. Since the cloud is accessible by everyone connected in the network the security risk of cloud data is also high. To improve the cloud storage and make the storage more effective we are implementing the audit function in cloud data to reduce the duplication of data in cloud storage. This audit is done using file id and hash key generated for every file during the time of uploading. Proof of Ownership is used to track the owner of the files uploaded. Clustering of user data is included to monitor user file and improve service to the user for that particular type of file. To avoid data remanence attack in the cloud data, we are implementing a secure data deletion scheme which required key to delete the files which cannot be recovered during the attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 2011, pp. 491–500.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 598–609.
Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231– 2244, 2012.
S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,”in Proceedings of the 22Nd USENIX Conference on Security, ser. SEC’13. Washington, D.C.: USENIX Association, 2013, pp. 179–194.
A. Mahendiran, N. Saravanan, N. Venkata Subramanian and N. Sairam, “Implementation of K-Means Clustering in Cloud Computing Environment” in Research Journal of Applied Sciences, Engineering and Technology, 2012, pp 1391–1394.
J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” in IEEE Conference on Communications and Network Security (CNS), 2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dinesh, N., Juvanna, I. (2017). Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud. In: Dash, S., Vijayakumar, K., Panigrahi, B., Das, S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 517. Springer, Singapore. https://doi.org/10.1007/978-981-10-3174-8_27
Download citation
DOI: https://doi.org/10.1007/978-981-10-3174-8_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3173-1
Online ISBN: 978-981-10-3174-8
eBook Packages: EngineeringEngineering (R0)