Front Inner Page - Volume 3 No.3 June 2016

  • » Back to Index

  • Title

    :

    Improving Security And Deduplication For Outsourced Database In Cloud ComputingImproving Security And Deduplication For Outsourced Database In Cloud Computing

    Authors

    :

    V.Suganya1,J.Viswanath2

    Keywords

    :

    Issue Date

    :

    June– 2016

    Abstract

    :

    To improve the security of data by using Elliptic Curve Cryptography (ECC) Algorithm. The duplicated data will be detected and avoid with a Secure Hash Algorithm (SHA). In many case when the dishonest Cloud Service Provider (CSP) deliberately recompense an empty set for the query requested by the user so we avoid this fraudulent result by using Bloom filter tree(BFT)which is used to check the exactness and completeness of the query result. Elliptic Curve Cryptography is used to improve the security and throughput rate. Another use of ECC algorithm is used to improve the integrity in Cloud while the data travelling from Data Owner to user over the Network. The deduplicated method is used to avoid duplicated Copies of data from other Data Owner and save our storage space in Cloud. The Arbitration Center which helps us to identify the duplicated copies and correct cloud users to upload and download the data.

    Page(s)

    :

    1-3

    ISSN

    :

    2347- 4734

    Source

    :

    Vol. 3, No.3, June 2016

    Download

    :


  • » Back index