[go: up one dir, main page]

El Ghazouani et al., 2019 - Google Patents

Blockchain & multi-agent system: a new promising approach for cloud data integrity auditing with deduplication

El Ghazouani et al., 2019

Document ID
16039781194998191878
Author
El Ghazouani M
El Kiram M
Er-Rajy L
Publication year
Publication venue
International Journal of Communication Networks and Information Security

External Links

Snippet

Recently, data storage represents one of the most important services in Cloud Computing. The cloud provider should ensure two major requirements which are data integrity and storage efficiency. Blockchain data structure and the efficient data deduplication represent …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • G06F17/30156De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30182File system types
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/3007File system administration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0628Dedicated interfaces to storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/064Management of blocks
    • G06F3/0641De-duplication techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1471Saving, restoring, recovering or retrying involving logging of persistent data for recovery
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0602Dedicated interfaces to storage systems specifically adapted to achieve a particular effect

Similar Documents

Publication Publication Date Title
El Ghazouani et al. Blockchain & multi-agent system: a new promising approach for cloud data integrity auditing with deduplication
Yang et al. Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage
Goswami et al. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
Rawat et al. iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity
US20220166605A1 (en) Cryptographic Key Storage System and Method
Sookhak et al. Towards dynamic remote data auditing in computational clouds
Periasamy et al. Efficient hash function–based duplication detection algorithm for data Deduplication deduction and reduction
El Ghazouani et al. Efficient method based on blockchain ensuring data integrity auditing with deduplication in cloud
Vijayakumar et al. Enhancing cloud storage security through blockchain-enabled data deduplication and auditing with a fair payment
Wan et al. Efficient privacy-preserving third-party auditing for ambient intelligence systems
Ponnuramu et al. Secured storage for dynamic data in cloud
Geetha et al. Blockchain based mechanism for cloud security
Thakur et al. Data integrity techniques in cloud computing: an analysis
Jose et al. Enhancing Security in Resource Sharing Using Key Holding Mechanism
Vishnupriya et al. Secure multicloud storage with policy based access control and cooperative provable data possession
Daniel et al. ES-DAS: An enhanced and secure dynamic auditing scheme for data storage in cloud environment
Bandanadam et al. A methodical literature survey on block chain-based public auditing in cloud: analysis on performance and door towards future scope
Chandran et al. Data management issues in cloud integrated computing: A big picture
Zhang et al. Lattice based multi-replica remote data integrity checking for data storage on cloud
Luo et al. On data and virtualization security risks and solutions of cloud computing
Saxena et al. A curious collaborative approach for data integrity verification in cloud computing
Kundu On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme
Raja et al. An enhanced study on cloud data services using security technologies
Alsulami et al. A survey on approaches of data confidentiality and integrity models in cloud computing systems
Nithisha et al. A Secured Data Storage Mechanism Using Baye’s Theorem and Matrix for Effective Data Communication in Cloud