A Survey on Detecting Data Deduplication and Provide Security in Cloud Computing

Download Now
Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Cloud
Format: PDF
There is no subsisting result can quietly support the ownership of both exactitude and integrity for the query corollary (result), notably in the case when the fraudulent Cloud Service Provider (CSP) deliberately recompense (returns) an empty set for the query asked by the user. The new verifiable auditing scheme for outsourced database, which can concurrently achieve the exactitude and integrity of search results even if the fraudulent CSP deliberately recompense an empty set. This paper achieves the desired security properties even in the encrypted outsourced database. In this paper, the deduplication method detects and avoids the duplicate data from the data owner.
Download Now

Find By Topic