International Journal of Engineering Sciences & Research Technology
|Journal Papers (1)||Details||Call for Paper||Manuscript submission||Publication Ethics||Contact||Authors' Guide Line|
|1 A COMBINED CLOUD ARCHITECTURE FOR PREVENTION OF DUPLICATION
AND ANONYMOUS USER AUTHENTICATION
, A.V.Survase, N.K.Malvadkar, M.V.Patil, P.V.Raut
Cloud computing is a rising computing standard in which assets of the computing framework are given as a service over the Internet. As guaranteeing as it may be, this standard additionally delivers a lot of people new challenges for data security and access control when clients outsource sensitive data for offering on cloud servers, which are not inside the same trusted dominion as dat a possessors. In any case, in completing thus, these results unavoidably present a substantial processing overhead on the data possessor for key distribution and data administration when fine - grained data access control is in demand, and subsequently don't scale Itll. The issue of at the same time accomplishing fine - grainedness, scalability, and data confidentiality of access control really still remains uncertain. This paper addresses this open issue by, on one hand, characterizing and implementing access policies based on data qualities, and, then again, permitting the data owner to representative the majority of the calculation undertakings included in fine - grained data access control to un - trusted cloud servers without unveiling the underlying data subst ance. It accomplish this goal by exploiting and combining techniques of decentralized key policy Attribute Based Encryption (KP - ABE). Extensive investigation shows that the proposed approach is highly efficient and secure. Data deduplication is one of impo rtant data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting dedu plication, the convergent encryption technique has been proposed to encrypt the data before outsourcing It also presents several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture.