El Ghazouani et al., 2019 - Google Patents
Blockchain & multi-agent system: a new promising approach for cloud data integrity auditing with deduplicationEl Ghazouani et al., 2019
- Document ID
- 16039781194998191878
- Author
- El Ghazouani M
- El Kiram M
- Er-Rajy L
- Publication year
- Publication venue
- International Journal of Communication Networks and Information Security
External Links
Snippet
Recently, data storage represents one of the most important services in Cloud Computing. The cloud provider should ensure two major requirements which are data integrity and storage efficiency. Blockchain data structure and the efficient data deduplication represent …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
- G06F17/30156—De-duplication implemented within the file system, e.g. based on file segments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30182—File system types
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30091—File storage and access structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/3007—File system administration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0628—Dedicated interfaces to storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/064—Management of blocks
- G06F3/0641—De-duplication techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1471—Saving, restoring, recovering or retrying involving logging of persistent data for recovery
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0602—Dedicated interfaces to storage systems specifically adapted to achieve a particular effect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| El Ghazouani et al. | Blockchain & multi-agent system: a new promising approach for cloud data integrity auditing with deduplication | |
| Yang et al. | Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage | |
| Goswami et al. | Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability | |
| Rawat et al. | iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity | |
| US20220166605A1 (en) | Cryptographic Key Storage System and Method | |
| Sookhak et al. | Towards dynamic remote data auditing in computational clouds | |
| Periasamy et al. | Efficient hash function–based duplication detection algorithm for data Deduplication deduction and reduction | |
| El Ghazouani et al. | Efficient method based on blockchain ensuring data integrity auditing with deduplication in cloud | |
| Vijayakumar et al. | Enhancing cloud storage security through blockchain-enabled data deduplication and auditing with a fair payment | |
| Wan et al. | Efficient privacy-preserving third-party auditing for ambient intelligence systems | |
| Ponnuramu et al. | Secured storage for dynamic data in cloud | |
| Geetha et al. | Blockchain based mechanism for cloud security | |
| Thakur et al. | Data integrity techniques in cloud computing: an analysis | |
| Jose et al. | Enhancing Security in Resource Sharing Using Key Holding Mechanism | |
| Vishnupriya et al. | Secure multicloud storage with policy based access control and cooperative provable data possession | |
| Daniel et al. | ES-DAS: An enhanced and secure dynamic auditing scheme for data storage in cloud environment | |
| Bandanadam et al. | A methodical literature survey on block chain-based public auditing in cloud: analysis on performance and door towards future scope | |
| Chandran et al. | Data management issues in cloud integrated computing: A big picture | |
| Zhang et al. | Lattice based multi-replica remote data integrity checking for data storage on cloud | |
| Luo et al. | On data and virtualization security risks and solutions of cloud computing | |
| Saxena et al. | A curious collaborative approach for data integrity verification in cloud computing | |
| Kundu | On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme | |
| Raja et al. | An enhanced study on cloud data services using security technologies | |
| Alsulami et al. | A survey on approaches of data confidentiality and integrity models in cloud computing systems | |
| Nithisha et al. | A Secured Data Storage Mechanism Using Baye’s Theorem and Matrix for Effective Data Communication in Cloud |