Paper 8912
Paper 8912
IJARSCT
International Journal of Advanced Research in Science, Communication and Technology (IJARSCT)
Abstract: The cloud is a novel technology, and cloud-based storage is a recently embraced concept that
enables users to share data with anybody at any time as well as upload material to the web and instantly
access available resources. However because data saved on the cloud can be accessed from any location
and from any device, and because very few traces are left behind, this technology makes it difficult for
someone to investigate and discover forensic evidence that may aid in forensic analysis. In order to combat
data leakage in the cloud environment, this article developed a dynamic strategy. Storage optimization is
taken into account during the de-duplication assessment of current data de-duplication methodologies,
practises, and implementations for the benefit of cloud service providers and cloud customers. By
computing the digest of files using file checksum techniques, the project also suggests a quick approach for
locating and eliminating duplicates. This approach recommends eliminating duplicate data, however the
duplication quest indicates that the user has privileges assigned and that each user has a distinct token.
This suggested method requires fewer cloud resources and is more dependable. It has also been
demonstrated that the suggested scheme has a low overhead in duplicate removal when compared to
conventional deduplication techniques.
Keywords: Data Mining, RBAC, Multi cloud data security, Proxy Key generation
sharing systems, data is broken up into pieces and stored at Dynamic Groups in the Cloud in IEEE
separate nodes. Block level duplication is done prior to TRANSACTIONS ON PAR- ALLEL AND
uploading these blocks. Two criteria will be used to DISTRIBUTED SYSTEMS, VOL. 27, NO. 1,
evaluate the system's security: data confidentiality and JANUARY 2016.
duplicate check authorisation. The stable de-duplication [4]. N. Attarpadung, B. Libert, and E. Pana_eu,
scheme is based on the POW scheme, convergent Expressive keypolicy attribute based encryption
encryption, and symmetric encryption. Data is protected with constant-size ciphertexts, in 2011.
by encryption before it is sent to the storage server. [5]. F. Zhang and K. Kim. ID-Based Blind
Signature and Ring Signature from Pairings. In
V. CONCLUSION ASIACRYPT 2002, volume 2501 of Lecture
Users can control information leaks to some extent by Notes in Computer Science, pages 533547.
distributing their data across many clouds, since no single Springer, 2002.
cloud provider has access to all of the user's data. [6]. J. Han, Q. Xu, and G. Chen. E_cient id-based
Unintentional dispersal of data chunks, however, can result threshold ring signature scheme. In EUC (2),
in unintended information leakage. We introduced a pages 437442. IEEE Computer Society, 2008.
multicloud storage system that is information leakage [7]. J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and
aware and uses unique techniques to reduce information Y. Chen. Forward secure identity based
leakage. signature: Security notions and construction.
Inf. Sci., 181(3):648660, 2011
REFERENCES [8]. Yang K, Jia X. DAC-MACS: E_ective data
[1]. Xue K, Xue Y, Hong J, Li W, Yue H, Wei DS, access control for multi-authority cloud storage
Hong P. RAAC: Robust and auditable access systems. InSecurity for Cloud Storage Systems
control with multiple attribute authorities for 2014 (pp. 59-83). Springer, New York, NY.
public cloud storage. IEEE Transactions on [9]. Guangyan Zhang at. al. proposed CaCo: An
Information Forensics and Security. 2017 Efficient Cauchy Coding Approach for Cloud
Apr;12(4):953-67. Storage Systems in IEEE Feb 2016.
[2]. Kan Yang and Xiaohua Jia, Expressive, [10]. Ibrahim Adel Ibrahim at. al. proposed
E_cient, and Revocable Data Access Control for Intelligent Data Placement Mechanism for
Multi-Authority Cloud Storage, IEEE Replicas Distribution in Cloud Storage Systems
Transactions on parallel and distributed in 2016 IEEE International Conference on
systems, VOL. 25, NO. 07, July 2014. Smart Cloud.
[3]. Zhongma Zhu and Rui Jiang proposed A Secure
Anti-Collusion Data Sharing Scheme for