International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 133 | Views: 251

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.9 / 10


     

Deduplication and Decentralized Access Control in Cloud with Efficient Public Auditing Mechanism

Sohail A. Khan, Dr. Shafi K. Pathan


Abstract: Cloud computing is a very important area which Permits client to remotely store their data into the cloud and enjoy the on-interest excellent applications and services. However in cloud computing, since the data is put away anyplace over the globe, the client organization has less control over the stored data. So here, security and privacy are very important things. The user should to validate himself / herself before beginning any transaction, and user privacy is also important so that the cloud or other user in cloud do not know the identity of user who stored the data. This is an access control system for data store away in cloud that gives anonymous authentication. In this scheme, the cloud confirms the user without knowing the users identity before storing data in the cloud by using ABS (Attributes Based Signature). The proposed scheme uses ABE (Attribute-Based Encryption) in which the attributes are match and according to matching attribute the various access control (Read, Write) are provide to user. Also for Integrity checking trusted outsider security service provider is used who does not store any data at its end, and its only confined to providing security service. Thus, enabling public auditability for cloud storage is of discriminating significance so that client can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be effortless. In Proposed system the task of Key distribution is done in a decentralized way, for this more than one KDC are used who shares the same databases. The scheme not only verifies the integrity of data but also performs De-duplication of files. Moreover, this authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The Experimental result show that the proposed system is more efficient in terms of data storage and security, and also it reduces the computation overhead of user by making the use of TPA.


Keywords: Cloud Computing, Key Distribution Center KDC, Attribute Based Encryption ABE, Third Party Auditor TPA, Integrity Checking, De-duplication checking, Access Control


Edition: Volume 5 Issue 6, June 2016


Pages: 336 - 341



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sohail A. Khan, Dr. Shafi K. Pathan, "Deduplication and Decentralized Access Control in Cloud with Efficient Public Auditing Mechanism", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 336-341, https://www.ijsr.net/getabstract.php?paperid=NOV163124

Similar Articles

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023

Pages: 306 - 309

A Basic Framework for Policy Updates for the Outsourced Exchange of Private Medical Records

V. Jayaganesh

Share this Article

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article
Top