A Survey on Detecting Data Deduplication and Provide Security in Cloud Computing
There is no subsisting result can quietly support the ownership of both exactitude and integrity for the query corollary (result), notably in the case when the fraudulent Cloud Service Provider (CSP) deliberately recompense (returns) an empty set for the query asked by the user. The new verifiable auditing scheme for outsourced database, which can concurrently achieve the exactitude and integrity of search results even if the fraudulent CSP deliberately recompense an empty set. This paper achieves the desired security properties even in the encrypted outsourced database. In this paper, the deduplication method detects and avoids the duplicate data from the data owner.
Subscribe to the Cloud Insider Newsletter
This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays