The verifiable secure schemes for resisting attacks in cloud deduplication services
by Xuan Li; Yongluo Shen; Jun Zhang
International Journal of Grid and Utility Computing (IJGUC), Vol. 7, No. 3, 2016

Abstract: Data deduplication is an impactful technology in cloud storage services which permits the cloud side to save the storage space by eliminating the duplicated data. In this paper, we study the risk of deduplication in cloud storage services. Two typical security issues on how clients can be cheated are demonstrated and analysed. Those attacks may result in data losses to the clients. We therefore propose two mechanisms that make the verification of data deduplication feasible. The proposed verification models can effectively reduce the risk of data deduplication.

Online publication date: Mon, 07-Nov-2016

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Grid and Utility Computing (IJGUC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com