Agnihothri Jyothsna, C Siva


Unlike the existing certified structures such as Jump List and Markel Tree, we design a single documented structure known as the Tree Homomorphism Authenticated Tree. We provide additional information on PoS and PoS dynamics. When the checker wants to determine the integrity of the file, it randomly picks up some of the file indexes in the file and sends it to the cloud server. From a better understanding, any Dynamic PoS application does not support this method. We have developed a new tool known as HAT, excellent authentication architecture. We have proposed excellent requirements for multi-user cloud storage and introduced the dynamic version of PoS. The current Dynamic PoSs cannot be extended to a multi-user environment. Because of the diversity of structures and the generation of posters, the current system cannot be extended to Dynamic PoS. A multi-user cloud storage system requires a security-based reduplication technology that allows a person to ignore the upload and file acquisition process immediately when other file owners send an identical cloud server. To reduce communications costs in both the storage phase and the reduplication phase by focusing on the same account cost. We show safety in our construction, as well as theoretical analysis and experimental results show that our building is used efficiently. In this paper, we introduce the concept of dynamic copy able storage proofs and propose an efficient creation known as DeyPoS to achieve simultaneous redundancy by PoS and simultaneous elimination of duplicate user data.


K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A high-availability and integrity layer for cloud storage,” in Proc. of CCS, pp. 187–198, 2009.

Z. Ren, L. Wang, Q. Wang, and M. Xu, “Dynamic Proofs of Retrievability for Coded Cloud Storage Systems,” IEEE Transactions on Services Computing, vol. PP, no. 99, pp. 1–1, 2015.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proc. of CCS, pp. 491–500, 2011.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS, pp. 355–370, 2009.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS, pp. 598–609, 2007.

A. Yun, J. H. Cheon, and Y. Kim, “On Homomorphic Signatures for Network Coding,” IEEE Transactions on Computers, vol. 59, no. 9, pp. 1295–1296, 2010.

Kun He, Jing Chen, Ruiying Du, Qianhong Wu, GuoliangXue, and Xiang Zhang, “DeyPoS: Deduplicatable Dynamic Proof ofStorage for Multi-User Environments”, IEEE Transactions on Computers, 2016.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.