High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Securing Data in Cloud through Data Sharing and Deduplication

Author(s):

Maregowda R , Channabasaveshwara Institute of Technology; Mahesh N, Channabasaveshwara Institute of Technology

Keywords:

Cloud computing, JAR Cryptography, Deduplication

Abstract

Cloud computing provides a set of resources and services offered through the Internet. Cloud service providers are delivering the service from data centers located throughout the world and providing virtual resources via internet. This services can be divided into 3 categories: IaaS, PaaS and SaaS. User’s information is stored in the cloud globally. In cloud information storage framework, users store their information in the cloud and won’t really have the information locally. Client's information is typically prepared remotely in obscure machines that clients don't possess or operate. In this paper influence the JAR programmable capacities to make a dynamic and traveling item, and to guarantee that any access to clients' information will trigger confirmation and generate the JAR locally. To make stronger client's control, likewise give appropriated reviewing components. In addition to this a privacy protection technique by name is proposed. This paper also introduces a structure for distributed accountability and reviewing, which is utilized to secure client's information and also tracking the actual usage of information in the cloud. Specifically in this paper, a logging mechanism is accommodated to provide the client's information with access policies, and guarantees that any access to their information will trigger confirmation, by this system data owner may know his/her information is taken care of according to his access policies. Information deduplication is one of important data compression strategies for eliminating with duplicates copies in the cloud storage to decrease the amount of storage space. To ensure the confidentiality of sensitive information while supporting deduplication, the convergent encryption strategy has been proposed to encrypt the information before outsourcing. To better information security, this paper addresses the issues of approved information deduplication.

Other Details

Paper ID: IJSRDV3I50770
Published in: Volume : 3, Issue : 5
Publication Date: 01/08/2015
Page(s): 1186-1189

Article Preview

Download Article