Encryption of Data with Authorized Deduplication in Cloud – A Survey

Authors

  • Sonu Gaikwad, Aishwarya Bijja, Nishant Gawali, Somnath Bhosale, Prachi Waghmare, Pankaj Shinde

Keywords:

Deduplication, encryption and decryption, Cloud computing, Cipher text.

Abstract

Storing the data is the most essential service of the cloud. The data we stored on the cloud in the form of text or images needs to be secured. Here comes the role of re-encryption and deduplication which are the most important factors to store data in the cloud without data leakage and deduplication. It will find for the proof of the owner to identify whether the user is authorized or not. This is the efficiency. Re-Encryption: The data which is stored in the cloud should be secured without the access of unauthorized users. Then comes the data security or re-encryption method to maintain the user's privacy and security of data stored in the cloud. The re-encryption role is to share the access key to only with an authorized user for accessing the file without the data leakage problem. Deduplication: We are protecting the text files and images by removing the deduplication in our purposed system. The results can be predicted the possible efficiency and effectiveness of the scheme for the possible practical deployment of data deduplication in cloud storage. For example, we have tons of personal individual images, and text files on our cell phones, PCs, Laptops, etc., So, these images and text files need to be secure for that we are using encryption to increase security. Aside from reducing overburden on the cloud system have many spots for data privacy and clouds users' privacy. However generally personal identifications like pan cards, Aadhar cards, passports, ATM copies, etc., need to keep secure on the cloud server. For avoiding deduplication and protecting our data we are proposing this.

Published

2023-03-14

How to Cite

Sonu Gaikwad, Aishwarya Bijja, Nishant Gawali, Somnath Bhosale, Prachi Waghmare, Pankaj Shinde. (2023). Encryption of Data with Authorized Deduplication in Cloud – A Survey. SJIS-P, 35(1), 268–275. Retrieved from http://sjis.scandinavian-iris.org/index.php/sjis/article/view/281

Issue

Section

Articles