A COMBINED CLOUD ARCHITECTURE FOR PREVENTION OF DUPLICATION AND ANONYMOUS USER AUTHENTICATION

Abstract

 Cloud computing is a rising computing standard in which assets of the computing framework are given as a service over the Internet. As guaranteeing as it may be, this standard additionally delivers a lot of people new challenges for data security and access control when clients outsource sensitive data for offering on cloud servers, which are not inside the same trusted dominion as data possessors. In any case, in completing thus, these results unavoidably present a substantial processing overhead on the data possessor for key distribution and data administration when fine-grained data access control is in demand, and subsequently don't scale Itll. The issue of at the same time accomplishing finegrainedness, scalability, and data confidentiality of access control really still remains uncertain. This paper addresses this open issue by, on one hand, characterizing and implementing access policies based on data qualities, and, then again, permitting the data owner to representative the majority of the calculation undertakings included in fine-grained data access control to un-trusted cloud servers without unveiling the underlying data substance. It accomplish this goal by exploiting and combining techniques of decentralized key policy Attribute Based Encryption (KP-ABE). Extensive investigation shows that the proposed approach is highly efficient and secure. Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing It also presents several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture.

Authors and Affiliations

S. Sutar*

Keywords

Related Articles

 Heart Disease Prediction System Using SVM and Naive Bayes

 As large amount of data is generated in medical organisations (hospitals,medical centers)but as this data is not properly used. There is a wealth of hidden information present in the datasets. This unused data can...

3 WAY SHIELD ENHANCED K - MEAN NORMALISATION BY INTELLIGENT INIITIALISATION OF CENTROID

"Learning to learn" is a notion of full excitement in advance research within machine learning .K - means is a most widely used approach in unsupervised machine learning algorithms though it was proposed 50 years a...

 ON THE TEMPERATURE IN A NON-HOMOGENEOUS BAR IN ASSOCIATIONWITHH --FUNCTION

 We employ theH -function to obtain the formal solution of the partial differential equation:2(1 ) v vut u u            Related to a problem of heat conduction by making use of the integral and orthog...

 WELL CONTOL STRATEGY PLAN FOR BLOCK VIII, DINDIR – SUDAN

 Well control problems plagued the petroleum industry since it is infancy and known as losses of valuable resources,costs increasing, environmental damages, personnel casualties. The objective of this research is to...

Application of Statistical Model of Water Level Variation in Reservoir Bauchi Township

Hydrological analysis and designs require information on flow rate at any point of Interest along a stream. However, in most cases, this information may not be available in sufficient quantity due to lack of continuous...

Download PDF file
  • EP ID EP164318
  • DOI -
  • Views 57
  • Downloads 0

How To Cite

S. Sutar* (0).  A COMBINED CLOUD ARCHITECTURE FOR PREVENTION OF DUPLICATION AND ANONYMOUS USER AUTHENTICATION. International Journal of Engineering Sciences & Research Technology, 5(2), 1-7. https://europub.co.uk/articles/-A-164318