z-logo
open-access-imgOpen Access
Deduplication Supporting Strong Privacy Protection for Cloud Storage
Author(s) -
K. Makanyadevi
Publication year - 2021
Publication title -
türk bilgisayar ve matematik eğitimi dergisi
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.218
H-Index - 3
ISSN - 1309-4653
DOI - 10.17762/turcomat.v12i2.1981
Subject(s) - cloud computing , computer science , computer security , data deduplication , encryption , overhead (engineering) , key (lock) , cloud computing security , safeguarding , information sensitivity , audit , set (abstract data type) , cloud storage , operating system , business , medicine , nursing , accounting , programming language
Cloud computing is developing as the following disruptive utility worldview. It gives broad capacity capabilities and an environment for application engineers through virtual machines. Third-party inspectors (TPAs) are becoming more common in cloud computing implementations. Consequently, including reviewers comes with its issues such as belief and preparing overhead To achieve productive examining, we ought to (1) fulfill efficiently auditing without asking the information area or introducing preparing overhead to the cloud client; (2) avoid presenting unused security vulnerabilities amid the auditing handle There are various security models for safeguarding the CCs (Cloud Client) information within the cloud. The TPA methodically analyzes the prove of compliance with set up security criteria within the connection between the CC and the Cloud Benefit Supplier (CSP). A novel strategy to create the record for a copy check, and utilize a modern methodology to create the key for the record encryption. In expansion, the client as it were must perform lightweight computation to produce information authenticators, verify cloud information keenness, and recover the information from the cloud.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here