International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129 | Views: 340

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Popularity: 6.9 / 10


     

Secure and Memory Efficient De-Duplication On Encrypted Data in Cloud Storage

Divya R, Arthi R, Indhumathi.M, Dr. U. V. Arivazhagu


Abstract: Today most of the Attackers target to social media network datas, this happen in malicious Environment. User doesnt know if our sharing data may be misused by attacker. We propose novel concept OTP based data view, data owner can ease to identify malicious user, because consumer should be validate for receive any data from data owner. All stored data must be based on Data Lineage concept. Data Lineage means share one copy of data to all users and also maintain all accessed consumer information for that data. In this way we can avoid Duplications and easy to identify data leakage. Effectively manage Database memory. In this paper, we propose a novel server-side deduplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. This prevents data leakage not only to revoked users even though they previously owned that data, but also to an honest-but- curious cloud storage server. In addition, the proposed scheme guarantees data integrity against any tag inconsistency attack. Thus, security is enhanced in the proposed scheme. The efficiency analysis results demonstrate that the proposed scheme is almost as efficient as the previous schemes, while the additional computational overhead is negligible.


Keywords: De-duplication, Cloud storage, Encryption, OTP, Revocation


Edition: Volume 6 Issue 4, April 2017


Pages: 99 - 106



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Divya R, Arthi R, Indhumathi.M, Dr. U. V. Arivazhagu, "Secure and Memory Efficient De-Duplication On Encrypted Data in Cloud Storage", International Journal of Science and Research (IJSR), Volume 6 Issue 4, April 2017, pp. 99-106, https://www.ijsr.net/getabstract.php?paperid=29031708, DOI: https://www.doi.org/10.21275/29031708



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article
Top