Blockchain Based De-Duplication Analysis of Cloud Data with Data Integrity using Policy Based Encryption Technique in Cloud Storage
Keywords:
Cloud computing, de-duplication, cloud data, data integrity, blockchain, encryptionAbstract
Cloud computing is one of developing areas of innovation, which permits capacity, access of information, programs, and ir execution over web while supplying an assortment of data relevant administrations. With cloud data administrations, it is fundamental for data must be kept safely and to be circulated securely throughout various clients. This research propose novel technique in cloud data based de-duplication analysis and data integrity by policy based encryption in cloud storage. Here cloud based data analysis and storage analysis has been carried out. data analysis for de-duplication is carried out using blockchain technique and data integrity is carried out using policy based encryption. experimental analysis shows parametric analysis in terms of data integrity, storage analysis, throughput, end-end delay and packet delivery ratio.
Downloads
References
Venkatachalam, K., Prabu, P., Almutairi, A., & Abouhawwash, M. (2021). Secure biometric au ntication with de-duplication on distributed cloud storage. PeerJ Computer Science, 7, e569.
Almrezeq, N. (2021). An Enhanced Approach to Improve Security and Performance for Deduplication. Turkish Journal of Computer and Ma matics Education (TURCOMAT), 12(6), 2866-2882.
Gnana Jeslin, J., & Mohan Kumar, P. (2022). Decentralized and Privacy Sensitive Data De-Duplication Framework for Convenient Big Data Management in Cloud Backup Systems. Symmetry, 14(7), 1392.
Rao, K. P. (2021). Efficient and Reliable Secure Cloud Storage Schema of Block chain for Data De-duplication in Cloud. Turkish Journal of Computer and Ma matics Education (TURCOMAT), 12(9), 1547-1556.
Ruba, S., & Kalpana, A. M. (2021). An Improved Blockchain-Based Secure Data Deduplication using Attribute-Based Role Key Generation with Efficient Cryptographic Methods.
Kalpana, A. M. An Improved Blockchain-Based Secure Data Deduplication using Attribute-Based Role Key Generation with E cient Cryptographic Methods.
Abdmeziem, F., Boukhedouma, S., & Oussalah, M. C. (2021, September). On data security of information systems: Comparison of approaches and challenges. In International Conference on Computational Science and Its Applications (pp. 240-255). Springer, Cham.
Jayabalan, J., & Jeyanthi, N. (2022). Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. Journal of Parallel and Distributed Computing, 164, 152-167.
Rajkumar, K., & Dhanakoti, V. Fuzzy-Dedup: A secure deduplication model using cosine based Fuzzy interference system in cloud application. Journal of Intelligent & Fuzzy Systems, (Preprint), 1-14.
Kumar, S., Bharti, A. K., & Amin, R. (2021). Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions. Security and Privacy, 4(5), e162.
Shaikh, A. H., & Meshram, B. B. (2022). Cloud Attacks and Defence Mechanism for SaaS: A Survey. In Intelligent Computing and Networking (pp. 43-52). Springer, Singapore.
Anil Kumar, G., & Shantala, C. P. (2022). Novel Modeling of Efficient Data Deduplication for Effective Redundancy Management in Cloud Environment. In Expert Clouds and Applications (pp. 479-490). Springer, Singapore.

Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Badari Narayan V. S., Akash Kumar Bhagat, Chethan C., Badria Sulaiman Alfurhood, Aditya Pratap Singh, Mahesh T. R.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.