Encryption of Data with Authorized Deduplication in Cloud – A Survey
Keywords:
Deduplication, encryption and decryption, Cloud computing, Cipher text.Abstract
Storing the data is the most essential service of the cloud. The data we stored on the cloud in the form of text or images needs to be secured. Here comes the role of re-encryption and deduplication which are the most important factors to store data in the cloud without data leakage and deduplication. It will find for the proof of the owner to identify whether the user is authorized or not. This is the efficiency. Re-Encryption: The data which is stored in the cloud should be secured without the access of unauthorized users. Then comes the data security or re-encryption method to maintain the user's privacy and security of data stored in the cloud. The re-encryption role is to share the access key to only with an authorized user for accessing the file without the data leakage problem. Deduplication: We are protecting the text files and images by removing the deduplication in our purposed system. The results can be predicted the possible efficiency and effectiveness of the scheme for the possible practical deployment of data deduplication in cloud storage. For example, we have tons of personal individual images, and text files on our cell phones, PCs, Laptops, etc., So, these images and text files need to be secure for that we are using encryption to increase security. Aside from reducing overburden on the cloud system have many spots for data privacy and clouds users' privacy. However generally personal identifications like pan cards, Aadhar cards, passports, ATM copies, etc., need to keep secure on the cloud server. For avoiding deduplication and protecting our data we are proposing this.