ATTRIBUTE BASED STORAGE SUPPORTING SECURITY DE-DUPLICATION FOR ENCRYPTED DATA IN CLOUD

Main Article Content

Nayana V
Pallavi A R
Prajwal D R
Priyanka M
Asha K

Abstract

Distributed computing gives an adaptable and helpful path for information sharing, which brings different advantages for both the general public and people. Be that as it may, there exists a characteristic protection for clients to specifically outsource the common information to the cloud server since the information regularly contain profitable data. In this way, it is important to put cryptographically improved access control on the common information. Trait based encryption is a promising crypto graphical crude to manufacture a reasonable information sharing framework. Be that as it may, get to control isn't static. To this end, we propose a thought called revocable-capacity Attribute-based encryption (RS-ABE), which can give the forward/in reverse security of figure message by presenting the functionalities of client renouncement and figure content refresh at the same time. The execution correlations demonstrate that the proposed RS-ABE plot has preferences as far as usefulness and effectiveness, and along these lines is possible for a viable and practical information sharing framework. At long last, we give execution consequences of the proposed plan to show its practicability.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

Y. Yang, H. Zhu, H. Lu, J. Weng, Y. Zhang, and K. R. Choo, “Cloud based data sharing with fine-grained proxy reencryption,†vol. 28, pp. 122–134, 2017. 2.B. Zhu, K. Li, and R. H. Patterson, “Avoiding the disk bottleneck in the data domain deduplication file system,†in 6th USENIX Conference on File and Storage Technologies, FAST 2008. 3. S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,†Washington, DC, USA, August 14-16, 2013. 4. M. Bellare and S. Keelveedhi, “Interactive messagelocked encryp-tion and secure deduplication,†in Public-Key Cryptography - PKC 2015. 5.S. Goldwasser and S. Micali, “Probabilistic encryption,†J. Comput.Syst. Sci., vol. 28, no. 2, pp. 270–299, 1984.