ESPoW: Efficient and secured proof of ownership method to enable authentic deduplicated data access in public cloud storage
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.25Keywords:
Data Deduplication, Cloud Storage Security, Proof of Ownership (PoW), Authentication Mechanism, Challenge-Response Protocol, Secure Data AccessDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The exponential growth of data in cloud environments necessitates efficient storage management solutions. Data deduplication, a technique that eliminates redundant data, has emerged as a key strategy to optimize storage utilization and reduce costs. However, deduplication introduces security challenges, particularly in verifying data ownership and protecting against unauthorized access. This paper presents efficient and secured proof of ownership (ESPoW), a novel proof-verifier technique designed to authenticate data ownership in deduplicated cloud storage environments. ESPoW utilizes a challenge-response mechanism and a unique secret value for each data file to ensure that only legitimate users can access their data, even in the presence of encrypted storage. Through rigorous experimentation and performance analysis, ESPoW demonstrates superior computational efficiency and enhanced security compared to existing methods. This approach provides a robust framework for secure and efficient deduplication in cloud storage, safeguarding sensitive data while optimizing storage resources.Abstract
How to Cite
Downloads
Similar Articles
- S. Sindhu, L. Arockiam, A lightweight selective stacking framework for IoT crop recommendation , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Maya Kumari, Vikas Y Patade, Z Ahmad, INVOLVEMENT OF PLANT MICRORNAS IN ABIOTIC STRESS RESPONSES , The Scientific Temper: Vol. 1 No. 01 (2010): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Nand Kishore, Abhaya Kumar Singh, THE ROLE OF REMOTE SENSING TECHNOLOGY IN COUNTERNAXALITE OPERATIONS: PROBLEMS AND PROSPECTS , The Scientific Temper: Vol. 1 No. 01 (2010): The Scientific Temper
- Ahmed Mustefa, Validating the dairy marketing performance of Mizan-Aman town, Bench-Sheko zone, Ethiopia , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Hemamalini V., Victoria Priscilla C, Deep learning driven image steganalysis approach with the impact of dilation rate using DDS_SE-net on diverse datasets , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- S. Deepa, I.S. Arafat, M. Sathya Priya, S. Saravanan, An improved spectrum sharing strategy evaluation over wireless network framework to perform error free communications , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- P. L. Parmar, P. M. George, Study and optimization of process parameters for deformation machining stretching mode , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Damtew Girma, Addisalem Mebratu, Fresew Belete, Response of potato (Solanum tuberosum L.) varieties to blended NPSB fertilizer rates on tuber yield and quality parameters in Gummer district, Southern Ethiopia , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 5 6 7 8 9 10 11 12 13 14 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper