CFP last date
20 January 2025
Reseach Article

Encrypted Big Data with Data Deduplication in Cloud

by Priyanka G. Masal, B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 6
Year of Publication: 2017
Authors: Priyanka G. Masal, B. M. Patil
10.5120/ijca2017915414

Priyanka G. Masal, B. M. Patil . Encrypted Big Data with Data Deduplication in Cloud. International Journal of Computer Applications. 174, 6 ( Sep 2017), 10-15. DOI=10.5120/ijca2017915414

@article{ 10.5120/ijca2017915414,
author = { Priyanka G. Masal, B. M. Patil },
title = { Encrypted Big Data with Data Deduplication in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 174 },
number = { 6 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number6/28410-2017915414/ },
doi = { 10.5120/ijca2017915414 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:25.675763+05:30
%A Priyanka G. Masal
%A B. M. Patil
%T Encrypted Big Data with Data Deduplication in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 6
%P 10-15
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a service by re-arranging resources in the Internet. Cloud service is popular for data storage. The data holder’s privacy is the data stored in cloud and in the encrypted form. The cloud data deduplication is new challenges by the encrypted data, which is for processing in cloud and big data storage. The deduplication is not working on encrypted data. Data has wide applications in zones like keeping money, investigative exploration, prescription and government offices. Order is one of the ordinarily utilized assignments as a part of information mining applications. For back as decade, due to the ascent of different protection issues. The numerous hypothetical and commonsense answers for the order issue have been proposed under diverse security models. The late fame of distributed computing with notwithstanding, clients now has the chance to outsource their information, the information mining assignments and in encoded structure to the cloud. The information on the cloud is in existing security protecting characterization methods and encoded structures are not appropriate. In this paper, the characterization issue over encoded information in system concentrates on fathoming. System proposes a safe k-NN classifier over scrambled information in the cloud. The index is created with the help of Vector base cosine similarity (VCS) multiple strings matching algorithm which matches the pre-defined set of keywords with information in the data files to index them and store relevant data. The classification of information, the information access designs and convention ensures security of client's data inquiry is proposed in this system. To the best of their learning, there work is the first to add to a safe k-NN classifier over scrambled information under the semi-legitimate model.

References
  1. Chi Chen at. Al. proposed An Efficient Privacy-Preserving Ranked Keyword Search Method IEEE 2016.
  2. Chunhua Su at. al. proposed Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework IEEE 2012.
  3. Cheng Huang and Rongxing Lu proposed EFPA: Efficient and Flexible Privacy-Preserving Mining of Association Rule in Cloud in IEEE 2015.
  4. Bharath K. Samanthula at. Al. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data MAY 2015.
  5. Lichun Li at. al. Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases in AUGUST 2016.
  6. M. Bellare, S. Keelveedhi, and T. Ristenpart, “DupLESS: Serveraided encryption for deduplicated storage,” in Proc. 22nd USENIXConf. Secur., 2013, pp. 179–194.
  7. Dropbox, A file-storage and sharing service. (2016). [Online]. Available: http://www.dropbox.com
  8. Google Drive. (2016). [Online]. Available: http://drive.google.com
  9. Mozy, Mozy: A File-storage and Sharing Service. (2016). [Online]. Available: http://mozy.com/
  10. Z. Yan, W. X. Ding, and H. Q. Zhu, “A scheme to manage encrypted data storage with deduplication in cloud,” in Proc. ICA3PP2015, Zhangjiajie, China, Nov. 2015, pp. 547–561.
  11. Z. Sun, J. Shen, and J. M. Yong, “DeDu: Building a deduplication storage system over cloud computing,” in Proc. IEEE Int. Conf. Comput. Supported Cooperative WorkDes.,2011,pp.348.355,doi:10.1109/CSCWD.2011.5960097.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Access Control Big Data Data Deduplication Encryption data k-NN classifier Security outsourced databases.