Published Fast: - If it's accepted, We aim to get your article published online in 48 hours.

Home / Articles

No Article found
ACHIEVING EFFICIENT SECURE DEDUPLICATION WITH USER DEFINED ACCESS CONTROL IN CLOUD
Author Name

S SHALINI, R THANGAPANDIAMMAL and M.RAJU

Abstract

By reconfiguring different resources across the Internet, cloud computing offers a cutting edge method of Offering services. Storage of data is the most significant a popular service on the cloud. Data are regularly stored in the cloud in an encrypted format to protect data owners' privacy. Cloud data deduplication, which is required for processing and storing vast amounts of data on the cloud, is extremely challenging when dealing with encrypted data.Conventional deduplication techniques fail when used to encrypted data. Security issues exist in current encrypted data deduplication methods. They are unable to provide flexible support for data access restriction and revocation. As a result, few of them can be employed in practise without difficulties. Using ownership challenge and proxy re encryption, we suggest a method for deduplicating Information stored in the cloud that has been encrypted in this study. It integrates data stored in the cloud deduplication along with access control. Utilising in depth analysis and computer simulations, we grade its performance.The results show how much more effective and efficient the plan is for possiblehands  on use, especially for extensive data deduplication in the cloud.



Published On :
2023-12-05

Article Download :
Publish your academic thesis as a book with ISBN Contact – connectirj@gmail.com
Visiters Count :