Deduplication on Encrypted Data in Cloud Computing
-
Published:2024-07-04
Issue:
Volume:
Page:3370-3373
-
ISSN:2456-2165
-
Container-title:International Journal of Innovative Science and Research Technology (IJISRT)
-
language:en
-
Short-container-title:International Journal of Innovative Science and Research Technology (IJISRT)
Author:
Tryambak Sambare Aditya,Hanmant Shingate Prathamesh,Kishor Shelke Amol,Ranjit Thakur Mansi,Sulthana G Nazia
Abstract
Cloud storage is a crucial component of cloud computing, allowing users to expand their storage without upgrading their equipment and overcome resource constraints. Cloud users' data is always encrypted before being outsourced to ensure their security and privacy. However, encrypted data may result in a significant waste of cloud resources. Storage complicates data sharing among authorized users. We continue to face issues with encrypted data storage and deduplication. Traditional deduplication strategies are designed for certain application settings where data owners or cloud servers have full control over the process. They cannot meet data owners' varying requests based on data sensitivity. This study proposes a flexible data storage management method that combines deduplication and access control across various Clouds. Service Providers (CSP). We assess its performance through security analyses, comparisons, and implementations. The results demonstrate security, effectiveness, and efficiency for actual applications.
Publisher
International Journal of Innovative Science and Research Technology
Reference30 articles.
1. R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proc. 2009 ACM Workshop Cloud Comput. Secur., pp. 85-90, 2009. 2. S. Kamara, and K. Lauter, "Cryptographic cloud storage," Financ. Crypto. Data Secur., pp. 136-149, Springer, 2010. 3. Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments," in Proc. 2012 IEEE INFOCOM, pp. 2581-2585, 2012. 4. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: scalable secure file sharing on untrusted storage," in Proc. USENIX Conf. File Storage Technol., pp. 29–42, 2003. 5. E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: securing remote untrusted storage," in Proc. Netw. Distrib. Syst. Secur. Symp., pp. 131-145, 2003.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mamsarajju: A Comprehensive Review of Ayurvedic and Modern Medical Perspectives;International Journal of Innovative Science and Research Technology (IJISRT);2024-07-09
|
|