International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129 | Views: 204

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017


Secure and Memory Efficient De-Duplication On Encrypted Data in Cloud Storage

Divya R [6] | Arthi R [3] | Indhumathi.M | Dr. U. V. Arivazhagu


Abstract: Today most of the Attackers target to social media network datas, this happen in malicious Environment. User doesnt know if our sharing data may be misused by attacker. We propose novel concept OTP based data view, data owner can ease to identify malicious user, because consumer should be validate for receive any data from data owner. All stored data must be based on Data Lineage concept. Data Lineage means share one copy of data to all users and also maintain all accessed consumer information for that data. In this way we can avoid Duplications and easy to identify data leakage. Effectively manage Database memory. In this paper, we propose a novel server-side deduplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. This prevents data leakage not only to revoked users even though they previously owned that data, but also to an honest-but- curious cloud storage server. In addition, the proposed scheme guarantees data integrity against any tag inconsistency attack. Thus, security is enhanced in the proposed scheme. The efficiency analysis results demonstrate that the proposed scheme is almost as efficient as the previous schemes, while the additional computational overhead is negligible.


Keywords: De-duplication, Cloud storage, Encryption, OTP, Revocation


Edition: Volume 6 Issue 4, April 2017,


Pages: 99 - 106


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top