International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 129

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017


Secure and Memory Efficient De-Duplication On Encrypted Data in Cloud Storage

Divya R, Arthi R, Indhumathi.M, Dr. U. V. Arivazhagu


Abstract: Today most of the Attackers target to social media network datas, this happen in malicious Environment. User doesnt know if our sharing data may be misused by attacker. We propose novel concept OTP based data view, data owner can ease to identify malicious user, because consumer should be validate for receive any data from data owner. All stored data must be based on Data Lineage concept. Data Lineage means share one copy of data to all users and also maintain all accessed consumer information for that data. In this way we can avoid Duplications and easy to identify data leakage. Effectively manage Database memory. In this paper, we propose a novel server-side deduplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. This prevents data leakage not only to revoked users even though they previously owned that data, but also to an honest-but- curious cloud storage server. In addition, the proposed scheme guarantees data integrity against any tag inconsistency attack. Thus, security is enhanced in the proposed scheme. The efficiency analysis results demonstrate that the proposed scheme is almost as efficient as the previous schemes, while the additional computational overhead is negligible.


Keywords: De-duplication, Cloud storage, Encryption, OTP, Revocation


Edition: Volume 6 Issue 4, April 2017,


Pages: 99 - 106


How to Cite this Article?

Divya R, Arthi R, Indhumathi.M, Dr. U. V. Arivazhagu, "Secure and Memory Efficient De-Duplication On Encrypted Data in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=29031708, Volume 6 Issue 4, April 2017, 99 - 106

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Deduplication'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Similar Articles with Keyword 'Cloud storage'

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'OTP'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, https://www.ijsr.net/issue.php?edition=Volume%203%20Issue%208,%20August%20201

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

Similar Articles with Keyword 'Revocation'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article
Top