Elimination of Redundant Data in Cloud with Secured Access Control

被引:0
|
作者
Vidhya, R. [1 ]
Rajan, Ganesh P. [1 ]
Lawrance, Alex T. [1 ]
机构
[1] Agni Coll Technol, Dept Informat Technol, Madras, Tamil Nadu, India
关键词
Deduplication; Encrypted data; Secured Access Control; Cloud computing;
D O I
10.1109/ICTACC.2017.44
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing provides a new way of service by offering various resources over Internet. One of the important service provided by cloud service is data storage. In order to preserve the privacy of users, these data are stored in cloud in an encrypted form. Deduplication becomes crucial and a challenging task when the data is stored in encrypted form, which also leads to complexity in storing large data and processing in cloud. A traditional deduplication method does not work on encrypted data. Existing solutions available for deduplicating encrypted data has various security issues. They does not provide access control and revocation in terms of storage. Hence, the deduplication schemes are not mostly deployed in practice. In this paper, we propose a technique to deduplicate encrypted data stored in cloud based on access control thereby avoiding redundant storage. It integrates cloud data deduplication with access control. The result of our scheme shows superior efficiency and has potential for practical deployment in the case of huge data storage.
引用
收藏
页码:141 / 143
页数:3
相关论文
共 50 条
  • [31] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [32] An efficient signcryption for data access control in cloud computing
    Li, Fagen
    Liu, Bo
    Hong, Jiaojiao
    COMPUTING, 2017, 99 (05) : 465 - 479
  • [33] A Secured Resource Access Management in Educational Cloud Computing Environment
    Idrissa, Saley Mato
    Djibo, Karimou
    Bisso, Saley
    Saliah-Hassane, Hamadou
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 14 - 19
  • [34] An iris recognition model for secured access to data
    El Khoury, Franjieh
    Egea, Marcel
    Meskaoui, Nada
    Wakim, Nagi
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (04) : 428 - 435
  • [35] Elimination of redundant information for web data mining
    Taib, SM
    Yeom, SJ
    Kang, BH
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 200 - 205
  • [36] Redundant data elimination in independent component analysis
    Liu, XH
    Randall, RB
    ISSPA 2005: THE 8TH INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND ITS APPLICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2005, : 29 - 32
  • [37] A Blockchain-Based Access Control Framework for Secured Data Sharing in Industrial Internet
    Zhou, Wei
    Jin, Jiahui
    2020 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD 2020), 2020, : 231 - 236
  • [38] Efficient and secured data partitioning in the multi cloud environment
    Hasan, Hazila
    Chuprat, Suriayati
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (05): : 200 - 208
  • [39] Secured Transfer and Storage Image Data for Cloud Communications
    Abdul-Hussein, Mohammad K.
    ALRikabi, Haider T. H. Salim
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2023, 19 (06) : 4 - 17
  • [40] Secured data storage with users validation in cloud environment
    Gangadharaiah N.K.C.
    Chinnasamy C.
    Gangadharaiah, Naveen Kumar Chunganahalli (cgnaveenkumar11@gmail.com), 2018, Lavoisier (23): : 61 - 72