Professional Documents
Culture Documents
Efficient Data Communication On Cloud by Secure Auditing and Deduplication
Efficient Data Communication On Cloud by Secure Auditing and Deduplication
Prof. Prashant Sadaphule, Priya Jawale, Rishabh Rapatwar, Uday Mahana, Chetan Magar
sadaphulecomdept@gmail.com, Priyajawale94@gmail.com, rishabh.rapatwar@gmail.com, Udaymahana30@gmail.com,
Chetanmagar44@gmail.com
Department of Computer Engineering, AISSMS’s IOIT, Pune
Fig 2. Deduplication
Auditing space
Deduplication
CONCLUSION
This paper shows the implementation of deduplication,
techniques used for integrity of data and security measures
taken to protect a file. We have successfully implemented the
systems SecCloud and SecCloud+ to show secure auditing
[2] Ateniese.G, R. Burns, R. Curtmola, J. Herring, L. Kissner, [9] M.Vanitha, Ar.Sivakumaran, L.Priyadharshini ,“A Study
Z.Peterson, and D. Song,“Provable Data Possession At on Secure Storage of Dynamic Audit Services in Cloud”,
Untrusted Stores”,In Proc. 14th ACM Conf. Computer and International Journal of Advanced Research in Electrical,
Comm. Security (CCS‟07), pp. 598-609, 2007 Electronics and Instrumentation Engineering Vol. 1, Issue 1
July 2012
[3] Wang.Q, C. Wang, K. Ren, W. Lou, and J. Li,“Enabling
Public Audit Ability And Data Dynamics For Storage [10] Feng Hao, Member, IEEE, Dylan Clarke, Avelino
Security In Cloud Computing”, In IEEE Trans. Parallel Francisco Zorzo ,“Deleting Secret Data with Public
Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011. Verifiability”, IEEE Transactions on Dependable and Secure
Computing ( Volume: 13, Issue: 6, Nov.-Dec. 1 2016).
[4] Yan Cong Wang, Student Member, IEEE, Sherman S.M.
Chow, Qian Wang, Student Member, IEEE, Kui Ren,