Book Details

Data integrity By Auditing the Data deduplication in SecCloud and SecCloud+

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format


In this work, we study the problem of duplication of data on cloud and develop a method to achieve data deduplication. His paper gives a solution for storing the data on cloud without duplicate copies and also ensures security to the stored data with encrypting it before uploading to the cloud. Since last decade, cloud computing is one of the biggest innovative technologies; it provides the facility of heavy data maintenance and management by improving data sharing and data storing capabilities. The main threat for this cloud data storage is data security in terms of maintains data integrity and datadeduplication on cloud. Handling both issue sane time is the difficult task. SecCloud and SecCloud+ are two new cloud auditing systems which help in maintaining cloud data integrity with efficient data deduplication, In SecCloud system, user can able to generate data tags before storing data on cloud which helps during performing audit to check integrity of data, other side SecCloud+ system provide encryption of data before uploading it, which enables integrity check and secure deduplication of encrypted data


[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Communication of the ACM, vol. 53, no. 4, pp. 50–58, 2010.

[2] J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” in IEEE Conference on Communications and Network Security (CNS), 2013, pp. 145–153.

[3] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 2011, pp. 491–500.

[4] S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proceedings of the 22Nd USENIX Conference on Security, ser. SEC’13. Washington, D.C.: USENIX Association, 2013, pp. 179–194. [Online]. Available:

[5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 598– 609.

[6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, “Remote data checking using provable data possession,” ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34, 2011.

[7] G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, ser. SecureComm ’08. New York, NY, USA: ACM, 2008, pp. 9:1–9:10.

[8] C. Erway, A. Kupc¸ ¨ u, C. Papamanthou, and R. Tamassia, “Dynamic ¨ provable data possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS ’09. New York, NY, USA: ACM, 2009, pp. 213–222.

[9] F. Sebe, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and ´ J.-J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Trans. on Knowl.and Data Eng., vol. 20, no. 8, pp. 1034–1038, 2008.

[10] H. Wang, “Proxy provable data possession in public clouds,” IEEE Transactions on Services Computing, vol. 6, no. 4, pp. 551–559, 2013.


Cloud computing, Data integrity, Auditing, Data deduplication

  • Format Volume 4, Issue 2, No 4, 2016
  • Copyright All Rights Reserved ©2016
  • Year of Publication 2016
  • Reference IJCS-135
  • Page No 795-800

Copyright 2021 SK Research Group of Companies. All Rights Reserved.