Volume 20 No 22 (2022)
 Download PDF
DATA SECURITY AND ACCESS CONTROL DATA DEDUPLICATION ACROSS MULTIPLE CLOUD FRAMEWORKS
Mrs.PINGILI SHANTHI, Mrs.MARYADA MAMATHA
Abstract
This paper investigated the application of a powerful method for eliminating similar data in a multi-cloud setting. It is obvious that using a private cloud as a middleman to find duplicate data is a secure method. Our approach to data sharing and storage ensures that access to the data on the public cloud is restricted to authorized users only. Data stored on the public cloud is neither encrypted or secure because of the outdated technology used.Our creative and reliable convergent key technology allows redundant data to be safely removed in a multicloud environment, which effectively tackles these challenges. Cloud servers that are open to the public house private cryptographic keys and sensitive personal information.Using this method, you can successfully remove files that are no longer needed, freeing up storage and internet space.
Keywords
Public Cloud, Convergent Key Encryption, File level Check, Block Level Check, Convergent key.
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.