ESPoW: Efficient and secured proof of ownership method to enable authentic deduplicated data access in public cloud storage
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.25Keywords:
Data Deduplication, Cloud Storage Security, Proof of Ownership (PoW), Authentication Mechanism, Challenge-Response Protocol, Secure Data AccessDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The exponential growth of data in cloud environments necessitates efficient storage management solutions. Data deduplication, a technique that eliminates redundant data, has emerged as a key strategy to optimize storage utilization and reduce costs. However, deduplication introduces security challenges, particularly in verifying data ownership and protecting against unauthorized access. This paper presents efficient and secured proof of ownership (ESPoW), a novel proof-verifier technique designed to authenticate data ownership in deduplicated cloud storage environments. ESPoW utilizes a challenge-response mechanism and a unique secret value for each data file to ensure that only legitimate users can access their data, even in the presence of encrypted storage. Through rigorous experimentation and performance analysis, ESPoW demonstrates superior computational efficiency and enhanced security compared to existing methods. This approach provides a robust framework for secure and efficient deduplication in cloud storage, safeguarding sensitive data while optimizing storage resources.Abstract
How to Cite
Downloads
Similar Articles
- N. Saranya, M. Kalpana Devi, A. Mythili, Summia P. H, Data science and machine learning methods for detecting credit card fraud , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Shantanu Kanade, Anuradha Kanade, Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Lakshminarayani A, A Shaik Abdul Khadir, A blockchain-integrated smart healthcare framework utilizing dynamic hunting leadership algorithm with deep learning-based disease detection and classification model , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- S. Prabagar, Vinay K. Nassa, Senthil V. M, Shilpa Abhang, Pravin P. Adivarekar, Sridevi R, Python-based social science applications’ profiling and optimization on HPC systems using task and data parallelism , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Chandrasekaran M, Rajesh P K, Optimization of cost to customer of power train in commercial vehicle using knapsack dynamic programming influenced by vehicle IoT data , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Optimizing IoT application deployment with fog - cloud paradigm: A resource-aware approach , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- S. C. Prabha, P. Sivaraaj, S. Kantha Lakshmi, Data analysis and machine learning-based modeling for real-time production , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- D. Jayadurga, A. Chandrabose, Expanding the quantity of virtual machines utilized within an open-source cloud infrastructure , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- M. Monika, J. Merline Vinotha, A Sustainable Vendor–Buyer Supply Chain Framework Integrating Energy Storage Systems and Green Investments with Incentive Policies under Demand Uncertainty , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Dileep Pulugu, Shaik K. Ahamed, Senthil Vadivu, Nisarg Gandhewar, U D Prasan, S. Koteswari, Empowering healthcare with NLP-driven deep learning unveiling biomedical materials through text mining , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 2 3 4 5 6 7 8 9 10 11 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

