Elimination of Redundant Data in Cloud with Secured Access Control

被引:0
|
作者
Vidhya, R. [1 ]
Rajan, Ganesh P. [1 ]
Lawrance, Alex T. [1 ]
机构
[1] Agni Coll Technol, Dept Informat Technol, Madras, Tamil Nadu, India
关键词
Deduplication; Encrypted data; Secured Access Control; Cloud computing;
D O I
10.1109/ICTACC.2017.44
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing provides a new way of service by offering various resources over Internet. One of the important service provided by cloud service is data storage. In order to preserve the privacy of users, these data are stored in cloud in an encrypted form. Deduplication becomes crucial and a challenging task when the data is stored in encrypted form, which also leads to complexity in storing large data and processing in cloud. A traditional deduplication method does not work on encrypted data. Existing solutions available for deduplicating encrypted data has various security issues. They does not provide access control and revocation in terms of storage. Hence, the deduplication schemes are not mostly deployed in practice. In this paper, we propose a technique to deduplicate encrypted data stored in cloud based on access control thereby avoiding redundant storage. It integrates cloud data deduplication with access control. The result of our scheme shows superior efficiency and has potential for practical deployment in the case of huge data storage.
引用
收藏
页码:141 / 143
页数:3
相关论文
共 50 条
  • [21] A Cloud data Access control and LockBox approach for data sharing
    Sahu, Chandraprabhat
    Pathre, Ayonija
    2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,
  • [22] Performance evaluation of secured storage access control system for public health records in cloud computing
    Malathi, P.
    Devi, S. Suganthi
    Jeya, J. Jospin
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024,
  • [23] DACPCC: A Data Access Control Scheme with Access Permission for Cloud Computing
    Wang Y.-D.
    Yang J.-H.
    Yang, Jia-Hai (yang@cernet.edu.cn), 2018, Chinese Institute of Electronics (46): : 236 - 244
  • [24] Secured data partitioning in multi cloud environment
    Hasan, Hazila
    Chuprat, Suriayati
    2014 4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), 2014, : 146 - 151
  • [25] Access Control and Data Separation Metrics in Cloud Infrastructures
    Jaeger, Bernd
    Kraftt, Reiner
    Luhn, Sebastian
    Selzer, Annika
    Waldmann, Ulrich
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 205 - 210
  • [26] Temporal Access Control with User Revocation for Cloud Data
    Balani, Nihal
    Ruj, Sushmita
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 336 - 342
  • [27] The Cloud Data Security and Access Control Model in the Study
    Dong, Jing
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 498 - 500
  • [28] Biometric verified Access Control of Critical Data on a Cloud
    Haqani, Hamid
    Saleem, Mir
    Banday, Shoaib Amin
    Khan, Ab Rouf
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [29] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [30] An efficient signcryption for data access control in cloud computing
    Fagen Li
    Bo Liu
    Jiaojiao Hong
    Computing, 2017, 99 : 465 - 479