Downloads: 129 | Views: 340
Research Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Popularity: 6.9 / 10
Secure and Memory Efficient De-Duplication On Encrypted Data in Cloud Storage
Divya R, Arthi R, Indhumathi.M, Dr. U. V. Arivazhagu
Abstract: Today most of the Attackers target to social media network datas, this happen in malicious Environment. User doesnt know if our sharing data may be misused by attacker. We propose novel concept OTP based data view, data owner can ease to identify malicious user, because consumer should be validate for receive any data from data owner. All stored data must be based on Data Lineage concept. Data Lineage means share one copy of data to all users and also maintain all accessed consumer information for that data. In this way we can avoid Duplications and easy to identify data leakage. Effectively manage Database memory. In this paper, we propose a novel server-side deduplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. This prevents data leakage not only to revoked users even though they previously owned that data, but also to an honest-but- curious cloud storage server. In addition, the proposed scheme guarantees data integrity against any tag inconsistency attack. Thus, security is enhanced in the proposed scheme. The efficiency analysis results demonstrate that the proposed scheme is almost as efficient as the previous schemes, while the additional computational overhead is negligible.
Keywords: De-duplication, Cloud storage, Encryption, OTP, Revocation
Edition: Volume 6 Issue 4, April 2017
Pages: 99 - 106
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash