
With the rapid development of cloud storage, more and more cloud clients can store and access their data anytime, from anywhere and using any device. Data deduplication may be considered an excellent choice to ensure data storage efficiency. Although cloud technology offers many advantages for storage service, it also introduces security challenges, especially with regards to data integrity, which is one of the most critical elements in any system. A data owner should thus enable data integrity auditing mechanisms. Much research has recently been undertaken to deal with these issues. In this paper, we propose a novel blockchain-based method, which can preserve cloud data integrity checking with data deduplication. In our method, a mediator performs data deduplication on the client side, which permits a reduction in the amount of outsourced data and a decrease in the computation time and the bandwidth used between the enterprise and the cloud service provider. This method supports private and public auditability. Our method also ensures the confidentiality of a client's data against auditors during the auditing process.
blockchain, FOS: Computer and information sciences, Technology, Cloud storage, auditingb, Security Challenges in Cloud Computing, Data science, Database, Blockchain, Data deduplication, Artificial Intelligence, Computer security, Data integrity, Accounting, Cloud computing, Business, Secure Computation, deduplication, T, cloud computing, Privacy-Preserving Techniques for Data Analysis and Machine Learning, Blockchain and Internet of Things Integration, Deduplication, Decentralization, IJIMAI, Audit, Computer science, auditing, Operating system, Computer Science, Physical Sciences, integrity, Remote Data Checking, Information Systems
blockchain, FOS: Computer and information sciences, Technology, Cloud storage, auditingb, Security Challenges in Cloud Computing, Data science, Database, Blockchain, Data deduplication, Artificial Intelligence, Computer security, Data integrity, Accounting, Cloud computing, Business, Secure Computation, deduplication, T, cloud computing, Privacy-Preserving Techniques for Data Analysis and Machine Learning, Blockchain and Internet of Things Integration, Deduplication, Decentralization, IJIMAI, Audit, Computer science, auditing, Operating system, Computer Science, Physical Sciences, integrity, Remote Data Checking, Information Systems
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 6 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
