z-logo
open-access-imgOpen Access
Security Aware High Scalable paradigm for Data Deduplication in Big Data cloud computing Environments
Author(s) -
P. Anitha,
R Dhanushram,
D Harihara Sudhan,
T R S Indhresh
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1916/1/012097
Subject(s) - data deduplication , computer science , cloud computing , encryption , scalability , computer security , access control , cloud storage , cloud computing security , data security , database , distributed computing , operating system
The challenge of data deduplication has piqued the interest of the research community in order to provide effective and efficient solutions for cloud data centres to remove bottlenecks caused by duplicate data on the exponential growth of outsourced data. An Imminent challenge is the presence of high redundant existence in the storage memory of the cloud environment. Traditional algorithm has been employed to mitigate the data duplication in the cloud environment but it is a daunting task since it requires an effective solution to manage the duplication in the application basis to eliminate the privacy violation on sensitive data. In order to tackle above mentioned issues, a new paradigm named as Security Aware High Scalable has been proposed on large scale computing data centres. Proposed method employed to secure the data Deduplication process using access control mechanism on data of the privileged authorities. Outsourced data will be in the form of encrypted files. Access control mechanism is provided to the secure authorities to conduct the data deduplication on the data that was outsourced. Access Control Mechanism is employed using encryption techniques. It uses randomised encryption that is convergent and stable distribution of ownership party keys to enable the cloud service provider to handle outsourced access to data even though control changes on a regular basis This prevents data from being leaked not just to to those who have had their rights removed who previously owned the data, but even to a degree trustworthy yet suspect server for cloud storage. Furthermore, the proposed technique protects integrity of data from attacks based on label inconsistencies. As a measure, the proposed technique has been modified that enhances security. The efficiency review reveals that the proposed system is nearly as successful as the existing ones, with just a small increase in computational overhead.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here