UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 3 | March 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 5
May-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1805808


Registration ID:
182742

Page Number

385-392

Share This Article


Jetir RMS

Title

Semantic Security For Data Confidentiality Using ABE With Identified Access Policies In Secure De-Duplication Of Encrypted Data In Cloud

Abstract

Cloud computing, a convenient means of accessing services, resources and applications over the web, shifts the main target of industries and organizations aloof from the readying and day-to-day running of their IT facilities by providing associate degree on-demand, self-service, and pay-asyou-go business model. It is, therefore, expected that cloud computing has continued to increase in quality in recent times. While cloud computing provides numerous edges to users, there square measure underlying security and privacy risks. as an example, multi-tenancy, resource pooling and shareability options are often exploited by cybercriminals and anyone with a malicious intent, to the harm of each cloud users and cloud service suppliers. Attribute-based coding (ABE) has been wide utilized in cloud computing wherever an information supplier outsources his/herencrypted data to a cloud service supplier, and might share the information with users possessing specific credentials (or attributes). However,the standard ABE system doesn't support secure deduplication, that is crucial for eliminating duplicate copies of identical information so as to avoid wasting space for storing and network information measure. during this paper, we have a tendency to gift AN attribute-based storage system with secure deduplication in an exceedingly hybrid cloud setting, wherever a personal cloud is liable for duplicate detection and a public cloud manages the storage. Compared with the previous information deduplication systems, our system has 2 benefits. Firstly, it are often accustomed confidentially share information with users by specifying access policies instead of sharing cryptography keys. Secondly, it deliver the goodss the quality notion of linguistics security for information confidentiality whereas existing systems solely achieve it by process a weaker security notion. additionally, we have a tendency to place forth a technique to change a ciphertext over one access policy into ciphertexts of constant plaintext however underneath different access policies while not revealing the underlying plaintext. it's expected, then, that cloud computing has emerged as a salient space of inquiry for security researchers. as an example, once user knowledge (e.g. documents, videos and photos) square measure uploaded or keep in an exceedingly cloud computing service, the data owners square measure unlikely to grasp the trail of the transmitted knowledge or whether or not the info square measure being collected and analyzed by a 3rd party, as well as a administrative unit (see the revelations by Edward Snowden – European Parliament 2014). As posited by Choo and Sarre (2015), it is important to strike a balance between privacy, legitimate police investigation and lawful knowledge access, so as to confirm that the privacy of innocent people won't be compromised (e.g. that fine-grained aspects of associate degree individual’s life can not be derived or inferred from the intelligence assortment and analysis).

Key Words

ABE, Storage, Deduplication, Data integrity, homomorphic encryption and searchable encryption

Cite This Article

"Semantic Security For Data Confidentiality Using ABE With Identified Access Policies In Secure De-Duplication Of Encrypted Data In Cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 5, page no.385-392, MAY-2018, Available :http://www.jetir.org/papers/JETIR1805808.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Semantic Security For Data Confidentiality Using ABE With Identified Access Policies In Secure De-Duplication Of Encrypted Data In Cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 5, page no. pp385-392, MAY-2018, Available at : http://www.jetir.org/papers/JETIR1805808.pdf

Publication Details

Published Paper ID: JETIR1805808
Registration ID: 182742
Published In: Volume 5 | Issue 5 | Year May-2018
DOI (Digital Object Identifier):
Page No: 385-392
Country: Hyderabad, TS, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002970

Print This Page

Current Call For Paper

Jetir RMS