ESPoW: Efficient and secured proof of ownership method to enable authentic deduplicated data access in public cloud storage
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.25Keywords:
Data Deduplication, Cloud Storage Security, Proof of Ownership (PoW), Authentication Mechanism, Challenge-Response Protocol, Secure Data AccessDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The exponential growth of data in cloud environments necessitates efficient storage management solutions. Data deduplication, a technique that eliminates redundant data, has emerged as a key strategy to optimize storage utilization and reduce costs. However, deduplication introduces security challenges, particularly in verifying data ownership and protecting against unauthorized access. This paper presents efficient and secured proof of ownership (ESPoW), a novel proof-verifier technique designed to authenticate data ownership in deduplicated cloud storage environments. ESPoW utilizes a challenge-response mechanism and a unique secret value for each data file to ensure that only legitimate users can access their data, even in the presence of encrypted storage. Through rigorous experimentation and performance analysis, ESPoW demonstrates superior computational efficiency and enhanced security compared to existing methods. This approach provides a robust framework for secure and efficient deduplication in cloud storage, safeguarding sensitive data while optimizing storage resources.Abstract
How to Cite
Downloads
Similar Articles
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Raja Selvaraj, Manikandasaran S. Sundari, EAM: Enhanced authentication method to ensure the authenticity and integrity of the data in VM migration to the cloud environment , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing security of cloud using static IP techniques , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Priya Nandhagopal, Jayasimman Lawrence, ETTG: Enhanced token and tag generation for authenticating users and deduplicating data stored in public cloud storage , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Aruljothi Rajasekaran, Jemima Priyadarsini R., ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- I.Bhuvaneshwarri, M. N. Sudha, An implementation of secure storage using blockchain technology on cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper