Enabling Secure and Effective Deduplication in Multi Clouds

Distributed storage, which is one of the main functions of distributed computing, enables clients of cloud services to think of their data as being stored in the cloud and to share it with qualified customers. In distributed storage, stable deduplication has been widely researched because it can eli...

Full description

Saved in:
Bibliographic Details
Published in:2024 7th International Conference on Devices, Circuits and Systems (ICDCS) pp. 55 - 59
Main Authors: P., Sreeja B., G, Rajeshkumar, B, Alagu Kiruthika, N, Sasi Prabha, R, Varshini, J, Afzal
Format: Conference Proceeding
Language:English
Published: IEEE 23-04-2024
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Distributed storage, which is one of the main functions of distributed computing, enables clients of cloud services to think of their data as being stored in the cloud and to share it with qualified customers. In distributed storage, stable deduplication has been widely researched because it can eliminate overt repetitiveness within scrambled data to reduce storage space significantly. In the field of safety and protection, many current continuous deduplication schemes highlight to a large extent the associated characteristics: information classification, label consistency, access control animal attack assaults. One technique for ensuring the accuracy of information in garage outsourcing is confirmed information possession. The article discusses the development of a green PDP scheme for a distributed cloud garage to facilitate provider migration scalability and statistics, where we keep in mind the lifecycle of multiple cloud service providers to maintain and maintain collaborative customer statistics. The cooperative scheme relies entirely on verifiable homomorphic reactions. Completeness, knowledge soundness, and zero-knowledge qualities may all be satisfied by our multi-proof zero-knowledge proof system, which strengthens the security of our system. The experiment shows that this solution has lower computational and communication overhead than non-cooperative approaches.
ISSN:2644-1802
DOI:10.1109/ICDCS59278.2024.10560485