A Literature Survey on Big Data Deduplication
Integrating Access Management and Proxy Re-encryption for Deduplicating Encrypted Data in Cloud
Keywords:
Big data, deduplication, Cloud computing, information storage, encrypted information, data privacy, access management, proxy re-encryption, cloud service, security weaknessAbstract
Big data primarily based Cloud computing offers a replacement method of service provision by re-arranging varied resources over the web. The foremost necessary and standard cloud service is information storage. So as to preserve the privacy of information holders, information are typically hold on in cloud in an encrypted kind. However, encrypted information introduce new challenges for cloud information de-duplication that becomes crucial for giant information storage and process in cloud. Ancient de-duplication schemes cannot work on encrypted information. Existing solutions of encrypted information de-duplication suffer from security weakness. They cannot flexibly support information access management [13] and revocation. Therefore, few of them is pronto deployed in observe. During this paper, we propose a theme to de-duplicate encrypted information hold on in cloud supported possession challenge and proxy re-encryption. It integrates cloud information de-duplication with access management.Published
2019-06-01
How to Cite
[1]
“A Literature Survey on Big Data Deduplication: Integrating Access Management and Proxy Re-encryption for Deduplicating Encrypted Data in Cloud”, JASRAE, vol. 16, no. 9, pp. 1704–1712, Jun. 2019, Accessed: Sep. 20, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/12459
Issue
Section
Articles
How to Cite
[1]
“A Literature Survey on Big Data Deduplication: Integrating Access Management and Proxy Re-encryption for Deduplicating Encrypted Data in Cloud”, JASRAE, vol. 16, no. 9, pp. 1704–1712, Jun. 2019, Accessed: Sep. 20, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/12459