Secure Data Transfer and Deletion from Counting Bloom Filter In Cloud Computing

Authors

  • N. S. Hemanth  Computer Applications, Madanapalle Institute of Techbology and Science, Madanapalle, Andhra Pradesh, India
  • Dr. A. Althaf Ali  Computer Applications, Madanapalle Institute of Techbology and Science, Madanapalle, Andhra Pradesh, India

DOI:

https://doi.org/10.32628/IJSRST229496

Keywords:

Cloud Computing, Security, Reliability, Bloom Channels

Abstract

Due to the growing growth of circulating storage, more and more content owners are choosing to relocate their files to cloud servers, which can significantly restrict the capacity of the nearby infrastructure. Moving information out of the cloud has become essential for information owners wishing to transform cloud-based cooperatives since different cloud-based groups offer varying degrees of information inventory management, such as security, reliability, speed of access, and pricing. As a result, a major challenge for evidence owners is figuring out how to gradually transfer data from one cloud to another while instantly erasing the transferred data from the first cloud. In this paper, we suggest a method for counting books based on Bloom channels to address this issue. The suggested strategy can ensure super-permanent information eradication in addition to secure information transfer. Additionally, the suggested architecture might take care of the uncontested requirements of public status without a problem with outsourcing. Finally, we will run a model to assess the viability and efficiency of our suggestion.

References

  1. C. Yang and J. Ye, “Secure and efficient fine-grained data access control scheme in cloud computing”, Journal of High-Speed Networks, Vol.21, No.4, pp.259–271, 2015.
  2. X. Chen, J. Li, J. Ma, et al., “New algorithms for secure outsourcing of modular exponentiations”, IEEE Transactions on Parallel and Distributed Systems, Vol.25, No.9, pp.2386–2396, 2014.
  3. P. Li, J. Li, Z. Huang, et al., “Privacy-preserving outsourced classification in cloud computing”, Cluster Computing, Vol.21, No.1, pp.277–286, 2018.
  4. B. Varghese and R. Buyya, “Next generation cloud computing: New trends and research directions”, Future Generation Computer Systems, Vol.79, pp.849–861, 2018.
  5. W. Shen, J. Qin, J. Yu, et al., “Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage”, IEEE Transactions on Information Forensics and Security, Vol.14, No.2, pp.331–346, 2019.
  6.  R. Kaur, I. Chana and J. Bhattacharya J, “Data deduplication techniques for efficient cloud storage management: A systematic review”, The Journal of Supercomputing, Vol.74, No.5, pp.2035–2085, 2018.
  7. Cisco, “Cisco global cloud index: Forecast and methodology, 2014–2019”,
  8. Cloudsfer, “Migrate & backup your files from any cloud to any cloud”,
  9. Y. Liu, S. Xiao, H. Wang, et al., “New provable data transfer from provable data possession and deletion for secure cloud storage”, International Journal of Distributed Sensor Networks, Vol.15, No.4, pp.1–12, 2019.
  10. Y. Wang, X. Tao, J. Ni, et al., “Data integrity checking with reliable data transfer for secure cloud storage”, International Journal of Web and Grid Services, Vol.14, No.1, pp.106–121, 2018.

Downloads

Published

2022-08-30

Issue

Section

Research Articles

How to Cite

[1]
N. S. Hemanth, Dr. A. Althaf Ali "Secure Data Transfer and Deletion from Counting Bloom Filter In Cloud Computing" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 9, Issue 4, pp.639-642, July-August-2022. Available at doi : https://doi.org/10.32628/IJSRST229496