A Survey on Detecting Data Deduplication and Provide Security in Cloud Computing

There is no subsisting result can quietly support the ownership of both exactitude and integrity for the query corollary (result), notably in the case when the fraudulent Cloud Service Provider (CSP) deliberately recompense (returns) an empty set for the query asked by the user. The new verifiable auditing scheme for outsourced database, which can concurrently achieve the exactitude and integrity of search results even if the fraudulent CSP deliberately recompense an empty set. This paper achieves the desired security properties even in the encrypted outsourced database. In this paper, the deduplication method detects and avoids the duplicate data from the data owner.

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Resource Details

Provided by:
International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic:
Cloud
Format:
PDF