International Journal of Computer Science and Mobile Computing (IJCSMC)
There is no subsisting result can quietly support the ownership of both exactitude and integrity for the query corollary (result), notably in the case when the fraudulent Cloud Service Provider (CSP) deliberately recompense (returns) an empty set for the query asked by the user. The new verifiable auditing scheme for outsourced database, which can concurrently achieve the exactitude and integrity of search results even if the fraudulent CSP deliberately recompense an empty set. This paper achieves the desired security properties even in the encrypted outsourced database. In this paper, the deduplication method detects and avoids the duplicate data from the data owner.