IMPROVING SECURITY AND DEDUPLICATION FOR OUTSOURCED DATABASE IN CLOUD COMPUTING

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3

Abstract

To improve the security of data by using Elliptic Curve Cryptography (ECC) Algorithm. The duplicated data will be detected and avoid with a Secure Hash Algorithm (SHA). In many case when the dishonest Cloud Service Provider (CSP) deliberately recompense an empty set for the query requested by the user so we avoid this fraudulent result by using Bloom filter tree(BFT)which is used to check the exactness and completeness of the query result. Elliptic Curve Cryptography is used to improve the security and throughput rate. Another use of ECC algorithm is used to improve the integrity in Cloud while the data travelling from Data Owner to user over the Network. The deduplicated method is used to avoid duplicated Copies of data from other Data Owner and save our storage space in Cloud. The Arbitration Center which helps us to identify the duplicated copies and correct cloud users to upload and download the data.

Authors and Affiliations

Suganya V. , Viswanath J

Keywords

Related Articles

Similarity Measurement Of Web Navigation Pattern Using K-Harmonic Mean Algorithm

we present a new method to improve the web Navigation Usage Pattern to discover the web data based on similarity between two cluster points. The web usage patterns can be extracted from Web server logs regularly verified...

High Voltage-Boosting Converters Based on Soft-Switched Interleaved Boost Converters

This project objective is to generalize the scheme for new switching interleaved step-up converters that is fit for high power applications and high step-up. In this scheme, high voltage-boosting converters are proposed....

SECURE DEMAND RESPONSE SCHEME USING SESSION KEYS

An Identity-based secure data retrieval scheme using Paillier cryptosystem for privacy-preserving applications. The proposed scheme is defined in the following accomplishment. Initially, immediate attribute rev...

A SURVEY ON ENERGY-AWARE RESOURCE ALLOCATION METHOD FOR SCIENTIFIC WORKFLOW EXECUTIONS IN CLOUD ENVIRONMENT

An Energy aware resource allocation method is used for allocating the consumption, energy and space. A Cloud platform is the central Storage area, and by Enlarging this can be achieved. Energy c...

A LITERATURE STUDY ON ASSOCIATION RULE MINING

Association Rule mining has become an essential topic in data mining during recent years. It gains more popularity because of its wide range of applicability. Many researches introduced new algorithms ba...

Download PDF file
  • EP ID EP365616
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

Suganya V. , Viswanath J (2016). IMPROVING SECURITY AND DEDUPLICATION FOR OUTSOURCED DATABASE IN CLOUD COMPUTING. Elysium Journal of Engineering Research and Management, 3(3), -. https://europub.co.uk/articles/-A-365616