Secured And Efficient Data Duplication With Re-Encryption Techniques

Authors

  • Sukanya Amirishetti
  • P.Sathish
  • Dr.V.Bapuji

DOI:

https://doi.org/10.46243/jst.2023.v8.i07.pp177-183

Keywords:

Encryption, Storage, Authorized, Architecture, Duplication, Secrecy, Security.

Abstract

To get rid of duplicate copies and conserve bandwidth, data duplication is a vital approach in cloud storage. A convergent encryption strategy is suggested to encrypt data before outsourcing to maintain sensitive data confidentially. This work considers varied user privileges in duplicate checks to address authorized data duplication. In a hybrid cloud architecture, it introduces novel duplication structures that facilitate authorized duplicate checking. The proposed authorized duplicate check technique is constructed and tested, and security analysis proves the scheme's security. When compared to standard operations, the proposed system has a low overhead. Before outsourcing data into the cloud, encryption measures are frequently employed to ensure secrecy, however, commercial storage providers are hesitant to utilize encryption due to the possibility of different cipher texts. Convergent encryption, which protects data secrecy while permitting duplication, has been offered as a solution to these problems. Systems for cloud storage have difficulty maintaining duplication, dependability, and confidentiality. Duplication is a method for maximizing the use of storage resources by preventing the creation of duplicate copies of the same material. Both single-cloud duplication architecture and multi-cloud duplication architecture are categories for it.

Downloads

Published

2023-07-27

How to Cite

Amirishetti, S., P.Sathish, & Dr.V.Bapuji. (2023). Secured And Efficient Data Duplication With Re-Encryption Techniques. Journal of Science & Technology (JST), 8(7), 177–183. https://doi.org/10.46243/jst.2023.v8.i07.pp177-183