Open Access Open Access  Restricted Access Subscription Access

Review on Image and Text Encrypted Data with Authorized Deduplication in Cloud

Vivek Nagaroje, Pratiksha Gorde, Ganesh Ranmale, Tanvi Kulkarni, Tejas Parbat

Abstract


For example, personal photos are stored on our cell phones, portable devices, computers, etc. Since these photos must remain private, we encrypt them. A text file has the same meaning for today's user. It should be kept securely on a cloud server. Digital photos must be protected during transmission, but copies of personally identifiable information such as panoramic cards, passports, ATM cards, etc. must be protected. Must be registered on wnpc. To reduce duplication in our proposed system, we protect text files and image data.


Full Text:

PDF

References


Halevi, S., Harnik, D., Pinkas, B., & Shulman-Peleg, A. (2011, October). Proofs of ownership in remote storage systems. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 491-500).

González-Manzano, L., & Orfila, A. (2015). An efficient confidentiality-preserving proof of ownership for deduplication. Journal of Network and Computer Applications, 50, 49-59..

Blasco, J., Di Pietro, R., Orfila, A., & Sorniotti, A. (2014, October). A tunable proof of ownership scheme for deduplication using bloom filters. In 2014 IEEE Conference on Communications and Network Security (pp. 481-489). IEEE..

Ng, W. K., Wen, Y., & Zhu, H. (2012, March). Private data deduplication protocols in cloud storage. In Proceedings of the 27th Annual ACM Symposium on Applied Computing (pp. 441-446)..

Di Pietro, R., & Sorniotti, A. (2012, May). Boosting efficiency and security in proof of ownership for deduplication. In Proceedings of the 7th ACM symposium on information, computer and communications security (pp. 81-82)..

Li, M., Qin, C., Li, J., & Lee, P. P. (2016). CDStore: Toward reliable, secure, and cost-efficient cloud storage via convergent dispersal. IEEE Internet Computing, 20(3), 45-53..

Xu, J., Chang, E. C., & Zhou, J. (2013, May). Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security (pp. 195-206).


Refbacks

  • There are currently no refbacks.