High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Deduplication of Encrypted Big Data in Cloud

Author(s):

Nishant Jain , MIT Academy of engineering; Nehal Pandey, MIT Academy of engineering; Nikshay Jain, MIT Academy of engineering; Ishita Mattoo, MIT Academy of engineering

Keywords:

Access Control, Big Data, Cloud Computing, Data Deduplication, Proxy Re-Encryption

Abstract

Cloud computing offers a brand new approach of service provision by re-arranging numerous resources over the web. The most major and widespread cloud service is information storage. So as to maintain the privacy of information holders, information square measure usually hold on cloud in associated degree encrypted kind. However, encrypted information introduces provocation for cloud information duplication that becomes crucial for large information storage and process in cloud. Ancient replicating schemes cannot work on encrypted information[1].They cannot exile support in- formation access management and abrogation. That is why, not of them may be without delay deployed in follow. During this paper, we gravitate to put forward a theme to deduplicate encrypted information hold on in cloud supported freehold challenge and proxy re-encryption[6]. It integrates cloud information deduplication with access management. We tend to valuate its performance based on in depth analysis and pc simulations. The results show the superior potency and effectiveness of the theme for potential sensible readying, particularly for large information deduplication in cloud storage[2].

Other Details

Paper ID: IJSRDV7I20150
Published in: Volume : 7, Issue : 2
Publication Date: 01/05/2019
Page(s): 217-220

Article Preview

Download Article