A Survey on Detection Deduplication Encrypted Files in Cloud
نویسنده
چکیده
ARTICLE INFO Today is the most important issue in cloud computing is duplication for any organization, so we analysis this issue an avoid the reparative files on cloud storage. Avoidance of the file is advantages the cloud size issue. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, on cloud storage. In this system we check the duplicate file on cloud storage also security apply using encryption. We use the AES encryption algorithm for encrypt the file simultaneously we check the duplicate file using the hashing algorithm. Also enhanced this system using recover option, cloud provide the deleted file backup on requesting. This paper study on the plain text as a input the system for checking the duplicate file, we next stage we analysis the encrypted file as a input to the system and find the duplicate file on the cloud storage.
منابع مشابه
Provable Ownership of Encrypted Files in De-duplication Cloud Storage
The rapid adoption of cloud storage services has created an issue that many duplicated copies of files are stored in the remote storage servers, which not only wastes the communication bandwidth for duplicated file uploading, but also increases the cost of security data management. To solve this problem, client-side deduplication was introduced to avoid the client from uploading files already e...
متن کاملSecure Deduplication of Encrypted Data: Refined Model and New Constructions
Cloud providers tend to save storage via cross-user deduplication, while users who care about privacy tend to encrypt their files on client-side. Secure deduplication of encrypted data (SDoE) which aims to reconcile this apparent contradiction is an active research topic. In this paper, we propose a formal security model for SDoE. We also propose two single-server SDoE protocols and prove their...
متن کاملA Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing
The popularity and widespread use of Cloud have brought great convenience for data sharing and data storage. The data sharing with a large number of participants take into account issuers like data integrity, efficiency and privacy of the owner for data. In cloud storage services one critical challenge is to manage ever-increasing volume of data storage in cloud. To make data management more sc...
متن کاملTowards Cloud Security Improvement with Encryption Intensity Selection
The emergence of cloud computing has enabled users to store and manage data at a low cost and high availability, which made outsourcing data become appealing to its customers. Since the inception of cloud computing, efforts have been dedicated to improve the security and performance of cloudbased backup services. However, there is yet to be implemented a complete scheme that provides security, ...
متن کاملA Survey on Detecting Data Deduplication and Provide Security in Cloud Computing
There is no subsisting result can quietly support the ownership of both exactitude and integrity for the query corollary (result), notably in the case when the fraudulent cloud service provider (CSP) deliberately recompense (returns) an empty set for the query asked by the user.The new verifiable auditing scheme for outsourced database, which can concurrently achieve the exactitude and integrit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016