Record Suppression with Personalized Security System

Record suppression works best when several client's re-appropriate comparable data to dispersed storage, but it presents security and ownership concerns. Each owner of similar information can prove to the distributed storage server that he has full ownership of the information by providing evid...

Full description

Saved in:
Bibliographic Details
Published in2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) Vol. 1; pp. 1794 - 1797
Main Authors P, Rishi, B A, Sri Nandhaan, K, Supasankar, A, Anandaraj
Format Conference Proceeding
LanguageEnglish
Published IEEE 17.03.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Record suppression works best when several client's re-appropriate comparable data to dispersed storage, but it presents security and ownership concerns. Each owner of similar information can prove to the distributed storage server that he has full ownership of the information by providing evidence of ownership schemes. Many clients would most likely encrypt their data before re-appropriating it to distributed storage to save security. The overwhelming majority of designs have security issues because they do not consider important shifts in information responsibility. We provide a sophisticated server-side deduplication method for encoded data in this work. Even when ownership radically changes, it enables the cloud server to restrict access to updated data. While the added computational cost is negligible, this paper plot is virtually as successful as the earlier versions. The recommended system defends against attacks based on label irregularities and information trustworthiness. This approach increases the security of the proposed application to guarantee data integrity and privacy.
ISSN:2575-7288
DOI:10.1109/ICACCS57279.2023.10112974