Abstract: We propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage is clearly seen in and around the scope of realization of the concept of cloud security

Keywords: Re-encryption, Simulations, Cloud computing, Data storage, Data deduplication


PDF | DOI: 10.17148/IJARCCE.2019.8212

Open chat
Chat with IJARCCE