Abstract: Cloud computing promises to increase the rapidness of application deployment and delivery. Authorized Data De-duplication in cloud computing deals with elimination of excessive usage storage space due to duplicated data and providing privacy for user’s .Each authorized user will get an individual token to access their file in the cloud and can perform duplicate check based on the privileges. Authorized user is able to use his/her own private keys to generate query and hence attributes are attached along with the file. Attributes are found in the private cloud; so, control immediately passes to the private cloud, where duplicate check can be performed. Data stored in the public cloud is accessed only by the authorized users with the help of different individual encryption privilege keys. Convergent and Symmetric encryption techniques produce identical cipher text that results in minimum overhead. Proof of reliability assures a verifier via an acknowledgement that a user’s file is available.
Keywords: Convergent encryption, De-duplication, duplicate check, hybrid cloud.
Title: Eliminating Redundancy in Cloud – Databases Using Authorized Hybrid Cloud Approach
Author: Satya Sudheer Varma Surimalla, Krishna. B
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals