Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Removal of Duplicate Storage of Encrypted Data in Cloud Computing Environment

Author : M.Maharasi 1 S.Keerthiga 2 P.Kiruthika 3 R.Nivetha 4 S.Priya 5

Date of Publication :14th March 2018

Abstract: Duplication removal is the important aspect of data storage in cloud. CP-ABE ciphertext-policy attribute-based encryption (CP-ABE) scheme supports secure deduplication. Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials. Existing ABE encryption system only used for secure encryption and does not support secure deduplication, duplication removal from identical data is important in order to save storage space and network bandwidth. Proposed system achieves confidentiality in data sharing and also achieves standard notion of semantic security for data confidentiality. In addition, we put forth a methodology to modify a ciphertext over one access policy into ciphertext of the same plaintext but under other access policies without revealing the underlying plaintext. In proposed work of this project implement using AES with blowfish algorithm is used to encrypt the files before storing it on the cloud. Blowfish has high security when compared to CP-ABE. The combination of enhanced AES and blowfish is used for data confidentiality. Performance of the proposed system is evaluated based on time taken for encryption/decryption, throughput and memory usage for different data formats like text file, image file, audio file and video file. And also key sharing process is to modified in proposed system. A one valid key is sharing to the users to access the data.

Reference :

Will Updated soon

Recent Article