Skip to main content

Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Computations in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 517))

Abstract

As cloud computing technology becomes the major storage and sharing of data in Internet era, outsourcing cloud server for storing data becomes the latest trend. All small business and major social networking sites rely on cloud storage for dynamic data storage. Storing and maintaining cloud data are not easy, it require lots of effort and space to manage cloud data. Since the cloud is accessible by everyone connected in the network the security risk of cloud data is also high. To improve the cloud storage and make the storage more effective we are implementing the audit function in cloud data to reduce the duplication of data in cloud storage. This audit is done using file id and hash key generated for every file during the time of uploading. Proof of Ownership is used to track the owner of the files uploaded. Clustering of user data is included to monitor user file and improve service to the user for that particular type of file. To avoid data remanence attack in the cloud data, we are implementing a secure data deletion scheme which required key to delete the files which cannot be recovered during the attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 2011, pp. 491–500.

    Google Scholar 

  2. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 598–609.

    Google Scholar 

  3. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231– 2244, 2012.

    Google Scholar 

  4. S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,”in Proceedings of the 22Nd USENIX Conference on Security, ser. SEC’13. Washington, D.C.: USENIX Association, 2013, pp. 179–194.

    Google Scholar 

  5. A. Mahendiran, N. Saravanan, N. Venkata Subramanian and N. Sairam, “Implementation of K-Means Clustering in Cloud Computing Environment” in Research Journal of Applied Sciences, Engineering and Technology, 2012, pp 1391–1394.

    Google Scholar 

  6. J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” in IEEE Conference on Communications and Network Security (CNS), 2013.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Dinesh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Dinesh, N., Juvanna, I. (2017). Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud. In: Dash, S., Vijayakumar, K., Panigrahi, B., Das, S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 517. Springer, Singapore. https://doi.org/10.1007/978-981-10-3174-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3174-8_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3173-1

  • Online ISBN: 978-981-10-3174-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics