Privacy Preserving Verification Scheme for Cloud Platform Using DML
Abstract Deduplication technology is familiar in cloud-based services. It is used to reduce the space and the bandwidth requirements as a result, it reduces the redundancy and stores only the original copy. Deduplication finds its usage when a group of users stores the same data to the cloud storage...
Published in: | Journal of Physics: Conference Series |
---|---|
Main Authors: | , , , |
Format: | Article in Journal/Newspaper |
Language: | unknown |
Published: |
IOP Publishing
2021
|
Subjects: | |
Online Access: | http://dx.doi.org/10.1088/1742-6596/1916/1/012154 https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154 https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154/pdf |
id |
crioppubl:10.1088/1742-6596/1916/1/012154 |
---|---|
record_format |
openpolar |
spelling |
crioppubl:10.1088/1742-6596/1916/1/012154 2024-06-02T08:05:49+00:00 Privacy Preserving Verification Scheme for Cloud Platform Using DML Sujaritha Akshara, D Ashfak Ahamed, A Chandhini shri, V S 2021 http://dx.doi.org/10.1088/1742-6596/1916/1/012154 https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154 https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154/pdf unknown IOP Publishing http://creativecommons.org/licenses/by/3.0/ https://iopscience.iop.org/info/page/text-and-data-mining Journal of Physics: Conference Series volume 1916, issue 1, page 012154 ISSN 1742-6588 1742-6596 journal-article 2021 crioppubl https://doi.org/10.1088/1742-6596/1916/1/012154 2024-05-07T13:59:55Z Abstract Deduplication technology is familiar in cloud-based services. It is used to reduce the space and the bandwidth requirements as a result, it reduces the redundancy and stores only the original copy. Deduplication finds its usage when a group of users stores the same data to the cloud storage service, but by using this method there is an issue regarding the ownership and security, and before getting into this process many users first encrypt their data and then share it with the cloud storage so that there is minimum or no privacy issue found. Recently so many models were released to solve this problem. That was actually done by sharing the same encrypted data for the same data which is shared by each owner. But by following this described method many flaws were found. We present a novel server-side deduplication model for all encrypted data in this paper. By following this model there is a proper control over the delegated data even after the control changes from person to person. So, Random convergent encryption and stable ownership key distribution are used. Through this method, the data theft can be prevented not only to the reward user but also to the old user who previously owned that data. Article in Journal/Newspaper DML IOP Publishing Journal of Physics: Conference Series 1916 1 012154 |
institution |
Open Polar |
collection |
IOP Publishing |
op_collection_id |
crioppubl |
language |
unknown |
description |
Abstract Deduplication technology is familiar in cloud-based services. It is used to reduce the space and the bandwidth requirements as a result, it reduces the redundancy and stores only the original copy. Deduplication finds its usage when a group of users stores the same data to the cloud storage service, but by using this method there is an issue regarding the ownership and security, and before getting into this process many users first encrypt their data and then share it with the cloud storage so that there is minimum or no privacy issue found. Recently so many models were released to solve this problem. That was actually done by sharing the same encrypted data for the same data which is shared by each owner. But by following this described method many flaws were found. We present a novel server-side deduplication model for all encrypted data in this paper. By following this model there is a proper control over the delegated data even after the control changes from person to person. So, Random convergent encryption and stable ownership key distribution are used. Through this method, the data theft can be prevented not only to the reward user but also to the old user who previously owned that data. |
format |
Article in Journal/Newspaper |
author |
Sujaritha Akshara, D Ashfak Ahamed, A Chandhini shri, V S |
spellingShingle |
Sujaritha Akshara, D Ashfak Ahamed, A Chandhini shri, V S Privacy Preserving Verification Scheme for Cloud Platform Using DML |
author_facet |
Sujaritha Akshara, D Ashfak Ahamed, A Chandhini shri, V S |
author_sort |
Sujaritha |
title |
Privacy Preserving Verification Scheme for Cloud Platform Using DML |
title_short |
Privacy Preserving Verification Scheme for Cloud Platform Using DML |
title_full |
Privacy Preserving Verification Scheme for Cloud Platform Using DML |
title_fullStr |
Privacy Preserving Verification Scheme for Cloud Platform Using DML |
title_full_unstemmed |
Privacy Preserving Verification Scheme for Cloud Platform Using DML |
title_sort |
privacy preserving verification scheme for cloud platform using dml |
publisher |
IOP Publishing |
publishDate |
2021 |
url |
http://dx.doi.org/10.1088/1742-6596/1916/1/012154 https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154 https://iopscience.iop.org/article/10.1088/1742-6596/1916/1/012154/pdf |
genre |
DML |
genre_facet |
DML |
op_source |
Journal of Physics: Conference Series volume 1916, issue 1, page 012154 ISSN 1742-6588 1742-6596 |
op_rights |
http://creativecommons.org/licenses/by/3.0/ https://iopscience.iop.org/info/page/text-and-data-mining |
op_doi |
https://doi.org/10.1088/1742-6596/1916/1/012154 |
container_title |
Journal of Physics: Conference Series |
container_volume |
1916 |
container_issue |
1 |
container_start_page |
012154 |
_version_ |
1800750697806823424 |