TAILIEUCHUNG - Private data deduplication protocols cloud storage
This preventsknowledge run not only to revoked users despite the fact that they antecedently in hand that knowledge, however conjointly toassociate honest-butcurious cloud storage server. In addition, the planned theme guarantees knowledge integrity against any tag inconsistency attack. | ISSN:2249-5789 Dr K Nachimuthu, International Journal of Computer Science & Communication Networks,Vol 6(4),187-189 Private Data Deduplication Protocols Cloud storage , MCA, ., ., (Computer Science), Principal Cambridge College of Arts and science, vettamangalam-post, Karur Abstract In cloud storage services, deduplication technology is often accustomed scale back the area and information measure requirements of services by eliminating redundant knowledge and storing solely one copy of them. Deduplication is best when multiple users source a similar knowledge to the cloud storage, however it raises problems about security and possession. Proofof- ownership schemes permit any owner of a similar knowledge to influence the cloud storage server that he ownsthe info during a strong way. However, several users square measure possible to inscribe their knowledge before outsourcing them to the cloud storage to preserve privacy, but this hampers deduplication thanks to the organization property of encoding. Recently, many deduplication schemes have been planned to unravel this drawback by permitting every owner to share a similar encoding key for a similar knowledge. However, most of the schemes suffer from security flaws, since they are doing not take into account the dynamic changes within the possession of outsourced knowledge that occur ofttimes during a sensible cloud storage service. during this paper, we tend to propose a completely unique server-side deduplication theme for encrypted knowledge. It permits the cloud server to regulate access to outsourced knowledge even once thepossession changes dynamically by exploiting irregular merging encoding and secure possession cluster key distribution. This preventsknowledge run not only to revoked users despite the fact that they antecedently in hand that knowledge, however conjointly toassociate honest-butcurious cloud storage server. In addition, the planned theme guarantees knowledge integrity
đang nạp các trang xem trước