ESPoW: Efficient and secured proof of ownership method to enable authentic deduplicated data access in public cloud storage
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.25Keywords:
Data Deduplication, Cloud Storage Security, Proof of Ownership (PoW), Authentication Mechanism, Challenge-Response Protocol, Secure Data AccessDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The exponential growth of data in cloud environments necessitates efficient storage management solutions. Data deduplication, a technique that eliminates redundant data, has emerged as a key strategy to optimize storage utilization and reduce costs. However, deduplication introduces security challenges, particularly in verifying data ownership and protecting against unauthorized access. This paper presents efficient and secured proof of ownership (ESPoW), a novel proof-verifier technique designed to authenticate data ownership in deduplicated cloud storage environments. ESPoW utilizes a challenge-response mechanism and a unique secret value for each data file to ensure that only legitimate users can access their data, even in the presence of encrypted storage. Through rigorous experimentation and performance analysis, ESPoW demonstrates superior computational efficiency and enhanced security compared to existing methods. This approach provides a robust framework for secure and efficient deduplication in cloud storage, safeguarding sensitive data while optimizing storage resources.Abstract
How to Cite
Downloads
Similar Articles
- Santhanalakshmi M, Ms Lakshana K, Ms Shahitya G M, Enhanced AES-256 cipher round algorithm for IoT applications , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- L. Amudavalli, K. Muthuramalingam, Energy-efficient location-based routing protocol for wireless sensor networks using teaching-learning soccer league optimization (TLSLO) , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Rahat Yezdani, S. M. K. Quadri, A PPR-based energy-efficient VM consolidation in cloud computing , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- J. Helan Shali Margret, N. Amsaveni, A study on recency patterns of cited resources in the cytokine publications from web of science , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- C. S. Manikandababu, V. Rukkumani, Advanced VLSI-based digital image contrast enhancement: A novel approach with modified image pixel evaluation logic , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- R Sharmila, Nikhil S Patankar, Manjula Prabakaran, Chandra M. V. S. Akana, Arvind K Shukla, T. Raja, Recent developments in flexible printed electronics and their use in food quality monitoring and intelligent food packaging , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- D. Prabakar, Santhosh Kumar D.R., R.S. Kumar, Chitra M., Somasundaram K., S.D.P. Ragavendiran, Narayan K. Vyas, Task offloading and trajectory control techniques in unmanned aerial vehicles with Internet of Things – An exhaustive review , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Sindhu S, L. Arockiam, DRMF: Optimizing machine learning accuracy in IoT crop recommendation with domain rules and MissForest imputation , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Kumari Neha, Amrita ., Quantum programming: Working with IBM’S qiskit tool , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
<< < 2 3 4 5 6 7 8 9 10 11 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper