DOIONLINE

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-6915

Publish In
International Journal of Advance Computational Engineering and Networking (IJACEN)-IJACEN
Journal Home
Volume Issue
Issue
Volume-5, Issue-2  ( Feb, 2017 )
Paper Title
Secure Public Cloud Authorization & De-Duplication Using Signature Based Key Policy and ECC
Author Name
Divya Jain, Vivek Sharma
Affilition
Information Technology Samrat Ashok Technological Institute Vidisha(M.P)
Pages
27-34
Abstract
As the rapid data expansion of data most current years, cloud computing has turn out to be one of the furthermost accepted area in IT industry with considers to cost, proficient use of computing possessions for example storage space and system bandwidth in the cloud computing communications. Data deduplication refers to a method that reduces the unnecessary data on the storage and transmitting on the network, and is think about to be one of the most-enabling storage technologies that presents well-organized resource exploitation in the cloud computing. On the additional hand, be appropriating data deduplication acquires protection vulnerabilities in the cloud storage method so that untrusted entities including a cloud server or unauthorized users may break data confidentiality, privacy and integrity on the outsourced data. It is difficult to resolve the difficulty of data defense and confidentiality regarding data de-duplication, but positively essential for presenting amature and established cloud storage service. Here in this paper for providing Data Security Differential human rights of users in the Duplicate ensure. Also a Hybrid Cloud Architecture is implemented in which the Duplicate-check tokens of files are generated by the private cloud servers with private keys. The methodology adopted here for token creation introduces only minimal overhead during the entire upload process and is negligible for moderate file sizes. Index Terms- Cloud computing, Data Deduplication, Data Storage, Remote Data, Elliptic Curves.
  View Paper