← Back to VOLUME 8, ISSUE 2, FEBRUARY 2019
Online-Cloud Based Data Security
Abstract:
We propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage is clearly seen in and around the scope of realization of the concept of cloud securityKeywords:
Re-encryption, Simulations, Cloud computing, Data storage, Data deduplicationHow to Cite:
[1] Anjali Dange, Satish Sahare, Shubham Amnerkar, Utkarsh Fopare, Vijay V. Chakole, “Online-Cloud Based Data Security,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2019.8212
