Home / Articles
ACHIEVING EFFICIENT SECURE DEDUPLICATION WITH USER DEFINED ACCESS CONTROL IN CLOUD | |
Author Name S SHALINI, R THANGAPANDIAMMAL and M.RAJU Abstract By reconfiguring different resources across the Internet, cloud computing offers a cutting edge method of Offering services. Storage of data is the most significant a popular service on the cloud. Data are regularly stored in the cloud in an encrypted format to protect data owners' privacy. Cloud data deduplication, which is required for processing and storing vast amounts of data on the cloud, is extremely challenging when dealing with encrypted data.Conventional deduplication techniques fail when used to encrypted data. Security issues exist in current encrypted data deduplication methods. They are unable to provide flexible support for data access restriction and revocation. As a result, few of them can be employed in practise without difficulties. Using ownership challenge and proxy re encryption, we suggest a method for deduplicating Information stored in the cloud that has been encrypted in this study. It integrates data stored in the cloud deduplication along with access control. Utilising in depth analysis and computer simulations, we grade its performance.The results show how much more effective and efficient the plan is for possiblehands on use, especially for extensive data deduplication in the cloud. Published On : 2023-12-05 Article Download : |