Research Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017
Secure and Memory Efficient De-Duplication On Encrypted Data in Cloud Storage
Divya R, Arthi R, Indhumathi.M, Dr. U. V. Arivazhagu
Abstract: Today most of the Attackers target to social media network datas, this happen in malicious Environment. User doesnt know if our sharing data may be misused by attacker. We propose novel concept OTP based data view, data owner can ease to identify malicious user, because consumer should be validate for receive any data from data owner. All stored data must be based on Data Lineage concept. Data Lineage means share one copy of data to all users and also maintain all accessed consumer information for that data. In this way we can avoid Duplications and easy to identify data leakage. Effectively manage Database memory. In this paper, we propose a novel server-side deduplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. This prevents data leakage not only to revoked users even though they previously owned that data, but also to an honest-but- curious cloud storage server. In addition, the proposed scheme guarantees data integrity against any tag inconsistency attack. Thus, security is enhanced in the proposed scheme. The efficiency analysis results demonstrate that the proposed scheme is almost as efficient as the previous schemes, while the additional computational overhead is negligible.
Keywords: De-duplication, Cloud storage, Encryption, OTP, Revocation
Edition: Volume 6 Issue 4, April 2017,
Pages: 99 - 106
How to Cite this Article?
Divya R, Arthi R, Indhumathi.M, Dr. U. V. Arivazhagu, "Secure and Memory Efficient De-Duplication On Encrypted Data in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=29031708, Volume 6 Issue 4, April 2017, 99 - 106
How to Share this Article?
Similar Articles with Keyword 'Deduplication'
A Survey on Deduplication Scheme in Cloud Storage
An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture
Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.
Similar Articles with Keyword 'Cloud storage'
An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Similar Articles with Keyword 'Encryption'
A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Similar Articles with Keyword 'OTP'
Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment
Deepak G, Dr. Pradeep. B. S, Shreyas Srinath
Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space
Taranpreet Kaur, Harmandeep Singh
Similar Articles with Keyword 'Revocation'
Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad