Efficient Identity-based Provable Multi-Copy Data Possession in Multi-Cloud Storage


A significant number of clients currently store multiple copies of their data on a variety of cloud servers. This helps to improve the data's availability as well as its long-term stability. The presentation of some provable data possession (PDP) protocols for multi-copy is made with the intention of ensuring the consistency of multiple copies. On the other hand, the vast majority of earlier PDP protocols consider all copies to be stored on just a single cloud storage server. When faced with such a situation, using multiple copies of something makes little to no sense. In addition, numerous PDP protocols are reliant on a method known as public key infrastructure (PKI), which is plagued by a wide variety of security flaws and carries with it a significant increase in the amount of money spent on Communication and computation. We offer an innovative identity-based PDP scheme of multi-copy on multiple cloud storage servers in order to improve both the safety and the effectiveness of the system. According to our plan, all of the copies are sent to various servers that are part of the cloud storage service, and these servers collaborate to store the customer's data. Through the use of homomorphic verifiable tags, it is possible to check the integrity of each and every copy at the same time. In the paper, both the system model and the security model of our scheme are described in detail. Our plan's safety can be demonstrated thanks to the computation Diffie-Hellman (CDH) hard problem, which was solved by our team. The results of our analysis and evaluation experiments indicate that our scheme is both effective and applicable. The method that has been proposed is the first identity-based PDP method that can be used for multiple copies and multiple cloud servers.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : TARA: An Efficient Random Access Mechanism for NB-IoT by Exploiting TA Value Difference in Collided Preambles ABSTRACT: The 3rd Generation Partnership Project (3GPP) has specified the narrowband Internet of Things
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering ABSTRACT: A wide variety of big data applications generate an enormous amount of streaming data that is high-dimensional, real-time, and constantly
PROJECT TITLE : Efficient Shapelet Discovery for Time Series Classification ABSTRACT: Recently, it was discovered that time-series shapelets, which are discriminative subsequences, are effective for the classification of time
PROJECT TITLE : Efficient Privacy-preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain ABSTRACT: Signal processing in an encrypted domain is a potential tool that could protect sensitive signals from untrusted

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry