Blockchain Based De-Duplication Analysis of Cloud Data with Data Integrity using Policy Based Encryption Technique in Cloud Storage

Authors

  • Badari Narayan V. S. Sri Siddhartha Academia of Higher Education, Computer science and engineering, Sri Siddharth Institute of technology, Tumakuru. https://orcid.org/0000-0003-3039-6993
  • Akash Kumar Bhagat Assistant Professor, Department of Computer Science, Arka Jain University, Jamshedpur, Jharkhand, India. https://orcid.org/0000-0001-8717-764X
  • Chethan C. Assistant Professor, Information Science & Engineering, Sri Venkateshwara College of Engineering, Bengaluru, India. https://orcid.org/0000-0002-2706-5977
  • Badria Sulaiman Alfurhood Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Saudi Arabia.
  • Aditya Pratap Singh Department of IT, Ajay Kumar Garg Engineering College, Ghaziabad, Uttar Pradesh, India. https://orcid.org/0000-0002-2349-3739
  • Mahesh T. R. Assistant Professor, Department of Computer Science Engineering, Faculty of Engineering and Technology, JAIN (Deemed-to-be University), Karnataka, India. https://orcid.org/0000-0002-5589-8992

Keywords:

Cloud computing, de-duplication, cloud data, data integrity, blockchain, encryption

Abstract

Cloud computing is one of developing areas of innovation, which permits capacity, access of information, programs, and ir execution over web while supplying an assortment of data relevant administrations. With cloud data administrations, it is fundamental for data must be kept safely and to be circulated securely throughout various clients. This research propose novel technique in cloud data based de-duplication analysis and data integrity by policy based encryption in cloud storage. Here cloud based data analysis and storage analysis has been carried out. data analysis for de-duplication is carried out using blockchain technique and data integrity is carried out using policy based encryption. experimental analysis shows parametric analysis in terms of data integrity, storage analysis, throughput, end-end delay and packet delivery ratio.

Downloads

Download data is not yet available.

References

Venkatachalam, K., Prabu, P., Almutairi, A., & Abouhawwash, M. (2021). Secure biometric au ntication with de-duplication on distributed cloud storage. PeerJ Computer Science, 7, e569.

Almrezeq, N. (2021). ‏ An Enhanced Approach to Improve Security and Performance for Deduplication. Turkish Journal of Computer and Ma matics Education (TURCOMAT), 12(6), 2866-2882.

Gnana Jeslin, J., & Mohan Kumar, P. (2022). Decentralized and Privacy Sensitive Data De-Duplication Framework for Convenient Big Data Management in Cloud Backup Systems. Symmetry, 14(7), 1392.

Rao, K. P. (2021). Efficient and Reliable Secure Cloud Storage Schema of Block chain for Data De-duplication in Cloud. Turkish Journal of Computer and Ma matics Education (TURCOMAT), 12(9), 1547-1556.

Ruba, S., & Kalpana, A. M. (2021). An Improved Blockchain-Based Secure Data Deduplication using Attribute-Based Role Key Generation with Efficient Cryptographic Methods.

Kalpana, A. M. An Improved Blockchain-Based Secure Data Deduplication using Attribute-Based Role Key Generation with E cient Cryptographic Methods.

Abdmeziem, F., Boukhedouma, S., & Oussalah, M. C. (2021, September). On data security of information systems: Comparison of approaches and challenges. In International Conference on Computational Science and Its Applications (pp. 240-255). Springer, Cham.

Jayabalan, J., & Jeyanthi, N. (2022). Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. Journal of Parallel and Distributed Computing, 164, 152-167.

Rajkumar, K., & Dhanakoti, V. Fuzzy-Dedup: A secure deduplication model using cosine based Fuzzy interference system in cloud application. Journal of Intelligent & Fuzzy Systems, (Preprint), 1-14.

Kumar, S., Bharti, A. K., & Amin, R. (2021). Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions. Security and Privacy, 4(5), e162.

Shaikh, A. H., & Meshram, B. B. (2022). Cloud Attacks and Defence Mechanism for SaaS: A Survey. In Intelligent Computing and Networking (pp. 43-52). Springer, Singapore.

Anil Kumar, G., & Shantala, C. P. (2022). Novel Modeling of Efficient Data Deduplication for Effective Redundancy Management in Cloud Environment. In Expert Clouds and Applications (pp. 479-490). Springer, Singapore.

data de-duplication and data integrity model

Downloads

Published

10.02.2023

How to Cite

V. S., B. N. ., Kumar Bhagat, A. ., C., C. ., Sulaiman Alfurhood, B. ., Pratap Singh, A. ., & T. R., M. . (2023). Blockchain Based De-Duplication Analysis of Cloud Data with Data Integrity using Policy Based Encryption Technique in Cloud Storage. International Journal of Intelligent Systems and Applications in Engineering, 11(3s), 161–164. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2555

Issue

Section

Research Article