T Neelima, A Shraban Kumar


Unlike the existing independent structures, for example, skip list and Merkle tree, we form a unique, certified structure known as the Homomorphism Authenticated Tree. We provide additional information about PoS and Dynamic PoS. When the checker determines file integrity, select some of the cluster indexes from the file, and then assign it to the cloud server. According to our understanding, do not support any of these points. We developed a new tool known as HAT, which is an excellent visual structure. We proposed the best of what is needed in multi-user cloud storage systems and introduced the dynamic type of PoS. The current dynamic service points cannot be extended to the multilateral domain. Due to the structural difference and the problem of creating tags, the current system cannot be extended to Dynamic PoS. A company in a multi-user company wants a secure user-side duplication technique, where a person shreds the screen saver and owns the files immediately, if other owners of the same files send them to your cloud server. To reduce communication costs in both the service phase demonstration and the duplication phase that focus on the same cost of earning. We maintain the safety of our structures, and also show the theoretical analysis and experimental results that our structure has used effectively. In this paper, we propose the idea of ​​replicating dynamic storage and proposing a competitive build known as DeyPoS, to achieve dynamic PoS and duplicate security for the mixed user at one time.


Kun He, Jing Chen, Ruiying Du, Qianhong Wu, GuoliangXue, and Xiang Zhang, “DeyPoS: Deduplicatable Dynamic Proof ofStorage for Multi-User Environments”, IEEE Transactions on Computers, 2016.

K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A high-availability and integrity layer for cloud storage,” in Proc. of CCS, pp. 187–198, 2009.

Z. Ren, L. Wang, Q. Wang, and M. Xu, “Dynamic Proofs of Retrievability for Coded Cloud Storage Systems,” IEEE Transactions on Services Computing, vol. PP, no. 99, pp. 1–1, 2015.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proc. of CCS, pp. 491–500, 2011.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS, pp. 355–370, 2009.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS, pp. 598–609, 2007.

A. Yun, J. H. Cheon, and Y. Kim, “On Homomorphic Signatures for Network Coding,” IEEE Transactions on Computers, vol. 59, no. 9, pp. 1295–1296, 2010.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.