Privacy Preserving Verification Scheme for Cloud Platform Using DML

Abstract Deduplication technology is familiar in cloud-based services. It is used to reduce the space and the bandwidth requirements as a result, it reduces the redundancy and stores only the original copy. Deduplication finds its usage when a group of users stores the same data to the cloud storage...

Full description

Bibliographic Details
Published in:Journal of Physics: Conference Series
Main Authors: Sujaritha, Akshara, D, Ashfak Ahamed, A, Chandhini shri, V S
Format: Article in Journal/Newspaper
Language:unknown
Published: IOP Publishing 2021
Subjects:
DML
Online Access:http://dx.doi.org/10.1088/1742-6596/1916/1/012154
https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154
https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154/pdf
id crioppubl:10.1088/1742-6596/1916/1/012154
record_format openpolar
spelling crioppubl:10.1088/1742-6596/1916/1/012154 2024-06-02T08:05:49+00:00 Privacy Preserving Verification Scheme for Cloud Platform Using DML Sujaritha Akshara, D Ashfak Ahamed, A Chandhini shri, V S 2021 http://dx.doi.org/10.1088/1742-6596/1916/1/012154 https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154 https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154/pdf unknown IOP Publishing http://creativecommons.org/licenses/by/3.0/ https://iopscience.iop.org/info/page/text-and-data-mining Journal of Physics: Conference Series volume 1916, issue 1, page 012154 ISSN 1742-6588 1742-6596 journal-article 2021 crioppubl https://doi.org/10.1088/1742-6596/1916/1/012154 2024-05-07T13:59:55Z Abstract Deduplication technology is familiar in cloud-based services. It is used to reduce the space and the bandwidth requirements as a result, it reduces the redundancy and stores only the original copy. Deduplication finds its usage when a group of users stores the same data to the cloud storage service, but by using this method there is an issue regarding the ownership and security, and before getting into this process many users first encrypt their data and then share it with the cloud storage so that there is minimum or no privacy issue found. Recently so many models were released to solve this problem. That was actually done by sharing the same encrypted data for the same data which is shared by each owner. But by following this described method many flaws were found. We present a novel server-side deduplication model for all encrypted data in this paper. By following this model there is a proper control over the delegated data even after the control changes from person to person. So, Random convergent encryption and stable ownership key distribution are used. Through this method, the data theft can be prevented not only to the reward user but also to the old user who previously owned that data. Article in Journal/Newspaper DML IOP Publishing Journal of Physics: Conference Series 1916 1 012154
institution Open Polar
collection IOP Publishing
op_collection_id crioppubl
language unknown
description Abstract Deduplication technology is familiar in cloud-based services. It is used to reduce the space and the bandwidth requirements as a result, it reduces the redundancy and stores only the original copy. Deduplication finds its usage when a group of users stores the same data to the cloud storage service, but by using this method there is an issue regarding the ownership and security, and before getting into this process many users first encrypt their data and then share it with the cloud storage so that there is minimum or no privacy issue found. Recently so many models were released to solve this problem. That was actually done by sharing the same encrypted data for the same data which is shared by each owner. But by following this described method many flaws were found. We present a novel server-side deduplication model for all encrypted data in this paper. By following this model there is a proper control over the delegated data even after the control changes from person to person. So, Random convergent encryption and stable ownership key distribution are used. Through this method, the data theft can be prevented not only to the reward user but also to the old user who previously owned that data.
format Article in Journal/Newspaper
author Sujaritha
Akshara, D
Ashfak Ahamed, A
Chandhini shri, V S
spellingShingle Sujaritha
Akshara, D
Ashfak Ahamed, A
Chandhini shri, V S
Privacy Preserving Verification Scheme for Cloud Platform Using DML
author_facet Sujaritha
Akshara, D
Ashfak Ahamed, A
Chandhini shri, V S
author_sort Sujaritha
title Privacy Preserving Verification Scheme for Cloud Platform Using DML
title_short Privacy Preserving Verification Scheme for Cloud Platform Using DML
title_full Privacy Preserving Verification Scheme for Cloud Platform Using DML
title_fullStr Privacy Preserving Verification Scheme for Cloud Platform Using DML
title_full_unstemmed Privacy Preserving Verification Scheme for Cloud Platform Using DML
title_sort privacy preserving verification scheme for cloud platform using dml
publisher IOP Publishing
publishDate 2021
url http://dx.doi.org/10.1088/1742-6596/1916/1/012154
https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154
https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154/pdf
genre DML
genre_facet DML
op_source Journal of Physics: Conference Series
volume 1916, issue 1, page 012154
ISSN 1742-6588 1742-6596
op_rights http://creativecommons.org/licenses/by/3.0/
https://iopscience.iop.org/info/page/text-and-data-mining
op_doi https://doi.org/10.1088/1742-6596/1916/1/012154
container_title Journal of Physics: Conference Series
container_volume 1916
container_issue 1
container_start_page 012154
_version_ 1800750697806823424