Secure and Effectual Cloud Data Deduplication Verification
Journal: International Journal of Trend in Scientific Research and Development (Vol.2, No. 3)Publication Date: 2018-08-02
Authors : Lingeshwaran. B Tamilselvan. V Vigneshwaran. V;
Page : 1734-1739
Keywords : Cloud computing;
Abstract
Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment. For example, the cloud server may intentionally omit some qualified results to save computational resources and communication overhead. Thus, a well-functioning secure query system should provide a query results verification mechanism that allows the data user to verify results. In this paper, we design a secure, easily integrated, and fine-grained query results verification mechanism, by which, given an encrypted query results set, the query user not only can verify the correctness of each data file in the set but also can further check how many or which qualified data files are not returned if the set is incomplete before decryption. The verification scheme is loose-coupling to concrete secure search techniques and can be very easily integrated into any secure query scheme. We achieve the goal by constructing secure verification object for encrypted cloud data. Furthermore, a short signature technique with extremely small storage cost is proposed to guarantee the authenticity of verification object and a verification object request technique is presented to allow the query user to securely obtain the desired verification object. Performance evaluation shows that the proposed schemes are practical and efficient. Lingeshwaran. B | Tamilselvan. V | Vigneshwaran. V"Secure and Effectual Cloud Data Deduplication Verification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11501.pdf http://www.ijtsrd.com/computer-science/data-processing/11501/secure-and-effectual-cloud-data-deduplication-verification/lingeshwaran-b
Other Latest Articles
- Adaptação da capoeira para idosas reumáticas
- Overview of Biometric Fingerprint Identification
- Approaches of Pattern Recognition in Analysing the Neurological Disorders: A Review
- Rights Against Exploitation in the Context of Women and Children
- An intelligent device control system using augmented reality and zigbee technology
Last modified: 2018-08-03 21:03:28