Ranked Keyword Search and Secure Data Sharing In Cloud Environment
Abstract
The cloud computing innovation appeared amid the21st century; outsourcing data to cloud benefit for capacity turns into a helpful yet proficient pattern, which benefits in saving endeavors on data support and administration. In this work, we concentrate the issue of secure de-duplication on cloud data, likewise guaranteeing integrity. In particular, going for accomplishing both data integrity and de-duplication in cloud, we propose a framework, specifically cloud. Cloud presents an auditing element with support of the cloud, which creates hash esteem before transferring and audit the integrity of data having been put away in cloud. Contrasted and past work, the calculation by client in D-Cloud is extraordinarily lessened amid the document transferring and auditing stages. Cloud is planned understanding the way that clients dependably need to encode their data being transferred, and empowers integrity auditing and secure de-duplication on scrambled data. The primary danger for this cloud data stockpiling is data security as far as keeps up data integrity and data deduplication on cloud. Taking care of both issue normal time is the troublesome assignment. SecCloud and SecCloud+ are two new cloud auditing frameworks which help in keeping up cloud data integrity with productive data deduplication, In SecCloud framework, client can ready to create data labels before putting away data on cloud which encourages amid performing audit to check integrity of data, opposite side SecCloud+ framework give encryption of data before transferring it, which empowers integrity check and secure deduplication of encoded data.
Keywords
References
P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. USENIX LISA, 2010.
M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
M. Bellare, S. Keelveedhi, T. Ristenpart. Message locked encryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon. In ICDCS, pages 617 -624, 2002. Reclaiming space from duplicate files in a serverless distributed file system.
J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou. Secure deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems 2013.
S. Quinlan and S. Dorward. Venti: a new approach to archival storage. USENIX FAST, Jan 2002.
A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui. A secure cloud backup system with assured deletion and version control. In International Workshop on Security in Cloud Computing 2011.
Z. Wilcox-O’Hearn and B. Warner. Tahoe: the leastauthority filesystem. ACM StorageSS, 2008.
J. Xu, E.-C. Chang, and J. Zhou. In ASIACCS, pages 195–206, 2013.Weak leakage resilient client side deduplication of encrypted data in cloud storage.
J. Yuan and S. Yu. Secure and constant cost public cloud storage auditing with deduplication 2013.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.