<?xml version="1.0" encoding="UTF-8"?>
		<www.jsetms.com>
		<Title>IMPROVED CLOUD STORAGE AUDITING SCHEME WITH DEDUPLICATION</Title>
		<Author>CH. Deepak Sumanth, G. Manideep, U. Abhinav, B. Vinay Reddy, Mr. Kundan. B</Author>
		<Volume>02</Volume>
		<Issue>08</Issue>
		<Abstract>Data grows at the impressive rate of 50 per year and 75 of the digital world is a copy Although keeping multiple copies of data is necessary to guarantee their availability and longterm durability in many situations the amount of data redundancy is immoderate By keeping a single copy of repeated data data deduplication is considered as one of the most promising solutions to reduce the storage costs and improve users experience by saving network bandwidth and reducing backup time However this solution must now solve many security issues to be completely satisfying In this paper we target the attacks from malicious clients that are based on the manipulation of data identifiers and those based on backup time and network traffic observation We present a deduplication scheme mixing an intra and an interuser deduplication to build a storage system that is secure against the type of attacks by controlling the correspondence between files and their identifiers and making the inter user deduplication unnoticeable to clients using deduplication proxies Our method provides global storage space savings perclient bandwidth network savings between clients and deduplication proxies and global network bandwidth savings between deduplication proxies and the storage server The evaluation of our solution compared to a classic system shows that the overhead introduced by our scheme is mostly due to data encryption which is necessary to ensure confidentiality</Abstract>
		<permissions>
<copyright-statement>Copyright (c) Journal of Science Engineering Technology and Management Science. All rights reserved</copyright-statement>
<copyright-year>2026</copyright-year>
</permissions>
		</www.jsetms.com>
		