Secure and Effectual Cloud Data Deduplication Verification
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 3
Abstract
Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment. For example, the cloud server may intentionally omit some qualified results to save computational resources and communication overhead. Thus, a well-functioning secure query system should provide a query results verification mechanism that allows the data user to verify results. In this paper, we design a secure, easily integrated, and fine-grained query results verification mechanism, by which, given an encrypted query results set, the query user not only can verify the correctness of each data file in the set but also can further check how many or which qualified data files are not returned if the set is incomplete before decryption. The verification scheme is loose-coupling to concrete secure search techniques and can be very easily integrated into any secure query scheme. We achieve the goal by constructing secure verification object for encrypted cloud data. Furthermore, a short signature technique with extremely small storage cost is proposed to guarantee the authenticity of verification object and a verification object request technique is presented to allow the query user to securely obtain the desired verification object. Performance evaluation shows that the proposed schemes are practical and efficient. Lingeshwaran. B | Tamilselvan. V | Vigneshwaran. V"Secure and Effectual Cloud Data Deduplication Verification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11501.pdf http://www.ijtsrd.com/computer-science/data-processing/11501/secure-and-effectual-cloud-data-deduplication-verification/lingeshwaran-b
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Communications in 5G Wireless Networks
Device to Device D2D communication is a wireless peer to peer service, that allows direct communication to discharge hub input by binding wireless broadcasting amongst devices, as a vital technology module for next gener...
Rights of Refugees in India
The researcher has done the research on rights of refugees in India. The International Convention dealing with the issue of refugees is the 1951 Convention on Status of Refugees and the 1967 Protocol attached to it. Th...
Green Building Materials and Methods An Overview
Green Building involves using a variety of different approaches and materials to make a structure that is healthy for the occupants, for the local area and globally. But there are two basic subcategories with location an...
Factors Influencing the Intention to Buy Products Online
The growth of information technology, including the internet, turns out to have a big impact on all aspects of life, this happens because the internet can be accessed anywhere and anytime. The rapidly growing number of i...
Evaluating the Service Quality at Lung Ngoc Hoang Tourist Site, Hau Giang Province
This study uses the IPA model to evaluate the service quality of the Lung Ngoc Hoang Tourist area. Research data were collected by convenient sampling with a sample size of 197 tourists who have ever visited and experien...