Open Access
ARTICLE
Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage
1 Department of Information Technology, Paavai Engineering College, Namakkal, 637018, India
2 Department of Computer Science and Engineering, Er. Perumal Manimekalai College of Engineering, Hosur, 635117, India
* Corresponding Author: B. Venkatesan. Email:
Intelligent Automation & Soft Computing 2022, 34(3), 1603-1615. https://doi.org/10.32604/iasc.2022.026049
Received 14 December 2021; Accepted 09 February 2022; Issue published 25 May 2022
Abstract
The cloud storage is essential environment for users to access high confidential data. Every single data is most valued by users. If we count, day by day information as well as, memory storage are increasing gradually. Cost of memory will increase when data increases with demand for storage. At present data duplication or redundant data storing in the cloud became hard for storage provider. Also, it makes security issue if repeated data from various users stored in the server. It makes data duplication, which is very efficient for intruders. Also, when same data stored in cloud, there will be a waste of storage. Our research article is focused on security of original data by generating the key from owner and identifying the repeated data, while storing in cloud platform. This process is called as data de-duplication, which is also known as intelligent based computing. Storing the data in single instance is very challenging among cloud computing researchers. In this article we propose a content level de-duplication with re-encryption using enhanced Randomized convergent encryption (ERCE) based on Poisson filter (PF). First the data is encrypted and re-encrypted using the cipher methodology. Generated key only stored and processed by authenticated user. Owner of the data give permission to access key. Then the Poisson filter is used in de-duplication process. if key is authenticated, then the authenticated user can access data from cloud server. Data is stored only once and accessing key decides who can access the data. The result is evaluated with various existing algorithm. our proposed algorithm proves less time in downloading file and less computation cost when comparing with existing system.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.