Privacy Persevering Data Deduplication And Proxy Re-Encryption Scheme For Secure Cloud Storage

Authors

  • P. Anantha Prabha
  • M. Asif Abdul Khader
  • K.V. Hamsanand
  • R. Hari Balaji

Abstract

Proxy re-encryption (PRE) emerges as a viable result for secure cloud data sharing applications, ensuring a streamlined and secure conversion of ciphertext. One of the most significant characteristics of cloud computing is storage, which lets users assign data storage to the cloud and allows safe sharing with authorized users. Existing secure data exchange schemes prioritize characteristics such as data secrecy, tag consistency, and access control for enhanced security and privacy. However, none of the currently known schemes can simultaneously fulfil all four requirements. To overcome this limitation, the proposed system utilize identity-based conditional PRE method that effectively supports both authorization processes and ciphertext evolution. The System also introduces an efficient secure deduplication technique and Proxy Re-Encryption (PRE) with access control defined by the user. A breakthrough solution that strikes a delicate balance between minimizing data duplication and safeguarding the privacy of cloud users is introduced. This is achieved through a novel approach that empowers Cloud Service Provider (CSP) to grant authorization for accessing data on behalf of data owners., all while maintaining strict confidentiality through secure deduplication techniques based on symmetric key cryptography. The rigorous security analysis confirms the robustness of this approach, and extensive simulations demonstrate its superior performance in terms of computational efficiency, communication overhead, storage optimization, and overall deduplication effectiveness, outperforming competing schemes.

Metrics

Metrics Loading ...

Downloads

Published

2024-02-13

How to Cite

Prabha, P. A. ., Khader, M. A. A. ., Hamsanand, K. ., & Balaji, R. H. . (2024). Privacy Persevering Data Deduplication And Proxy Re-Encryption Scheme For Secure Cloud Storage. Migration Letters, 21(S5), 1620–1627. Retrieved from https://migrationletters.com/index.php/ml/article/view/8416

Issue

Section

Articles