Elimination of Redundant Data in Cloud with Secured Access Control

被引:0
|
作者
Vidhya, R. [1 ]
Rajan, Ganesh P. [1 ]
Lawrance, Alex T. [1 ]
机构
[1] Agni Coll Technol, Dept Informat Technol, Madras, Tamil Nadu, India
关键词
Deduplication; Encrypted data; Secured Access Control; Cloud computing;
D O I
10.1109/ICTACC.2017.44
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing provides a new way of service by offering various resources over Internet. One of the important service provided by cloud service is data storage. In order to preserve the privacy of users, these data are stored in cloud in an encrypted form. Deduplication becomes crucial and a challenging task when the data is stored in encrypted form, which also leads to complexity in storing large data and processing in cloud. A traditional deduplication method does not work on encrypted data. Existing solutions available for deduplicating encrypted data has various security issues. They does not provide access control and revocation in terms of storage. Hence, the deduplication schemes are not mostly deployed in practice. In this paper, we propose a technique to deduplicate encrypted data stored in cloud based on access control thereby avoiding redundant storage. It integrates cloud data deduplication with access control. The result of our scheme shows superior efficiency and has potential for practical deployment in the case of huge data storage.
引用
收藏
页码:141 / 143
页数:3
相关论文
共 50 条
  • [41] Architecture of Data Access Based on Power Dispatch Control Cloud
    Zhou Xiaoming
    Lei, Tao
    Li Dapeng
    Tao, Xie
    PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 353 - 357
  • [42] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (12):
  • [43] On the Security of Data Access Control for Multiauthority Cloud Storage Systems
    Wu, Xianglong
    Jiang, Rui
    Bhargava, Bharat
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (02) : 258 - 272
  • [44] Cloud Computing: Preserving Data Privacy and Managing Access Control
    Giweli, Nabil
    Shahrestani, Seyed
    Cheung, Hon
    INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
  • [45] Identity and Access Control Techniques for Enhanced Data Communication in Cloud
    Dixit, Rashmi
    Ravindranath, K.
    CONTEMPORARY MATHEMATICS, 2024, 5 (01):
  • [46] BACC: Blockchain-Based Access Control For Cloud Data
    Sohrabi, Nasrin
    Yi, Xun
    Tari, Zahir
    Khalil, Ibrahim
    PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2020), 2020,
  • [47] Data Access Control in Cloud Computing: Flexible and Receiver Extendable
    Lai, Jianchang
    Guo, Fuchun
    Susilo, Willy
    Huang, Xinyi
    Jiang, Peng
    Zhang, Futai
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2658 - 2670
  • [48] Keyword Search With Access Control Over Encrypted Cloud Data
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    IEEE SENSORS JOURNAL, 2017, 17 (03) : 858 - 868
  • [49] Statistical privacy protection for secure data access control in cloud ☆
    Baseri, Yaser
    Hafid, Abdelhakim
    Firoozjaei, Mahdi Daghmehchi
    Cherkaoui, Soumaya
    Ray, Indrakshi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
  • [50] CDController: A Cloud Data Access Control System based on Reputation
    Lin, Huaqing
    Yan, Zheng
    Kantola, Raimo
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2017, : 223 - 230