Key points are not available for this paper at this time.
Cloud storage providers can save a significant amount of storage and bandwidth by using data deduplication, a technique that eliminates duplicated data by maintaining only one duplicate of a file.Cloud storage services allow individuals and organisations to outsource data storage to distant servers.In cloud data centres, deduplication is now a commonly used technology to increase the effectiveness of IT resources.An attacker can see if a file (such a pay stub with a name and salary amount) has already been stored (by someone else) by using the duplicate check, which exposes the user's sensitive data.Due to factors including high computational cost, low attack resistance, information leakage, and others, the majority of earlier methods that depend on the support of a trusted key server (KS) are insecure and constrained.A single point of failure results from the breakdown of the entire system due to the failure of the trustworthy KS.Data duplication in the current system has security problems.Therefore, we are using double encryption and hash code creation to help us solve these problems.It combines access control with cloud data deduplication.Because only authorized data holders have access to the symmetric keys needed for data decryption, encrypted data can be safely accessed.Our technique is efficient and safe under the specified security model, and it is highly appropriate for massive data deduplication, according to a thorough performance study and test.We use computer simulations and in-depth analysis to assess its performance.The outcomes demonstrate the scheme's higher efficacy and efficiency for a possible real-world implementation, particularly for huge data deduplication in cloud storage.
Building similarity graph...
Analyzing shared references across papers
Loading...
Amit Dattatrayghadage
Shrutika Chandrakantjamdade
Shweta Devidaspamane
International Research Journal of Modernization in Engineering Technology and Science
Sahyadri Hospital
Building similarity graph...
Analyzing shared references across papers
Loading...
Dattatrayghadage et al. (Sun,) studied this question.
www.synapsesocial.com/papers/68e6e3efb6db64358765fb05 — DOI: https://doi.org/10.56726/irjmets53309
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context: