Record Suppression with Personalized Security System
Record suppression works best when several client's re-appropriate comparable data to dispersed storage, but it presents security and ownership concerns. Each owner of similar information can prove to the distributed storage server that he has full ownership of the information by providing evid...
Saved in:
Published in | 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) Vol. 1; pp. 1794 - 1797 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
17.03.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Record suppression works best when several client's re-appropriate comparable data to dispersed storage, but it presents security and ownership concerns. Each owner of similar information can prove to the distributed storage server that he has full ownership of the information by providing evidence of ownership schemes. Many clients would most likely encrypt their data before re-appropriating it to distributed storage to save security. The overwhelming majority of designs have security issues because they do not consider important shifts in information responsibility. We provide a sophisticated server-side deduplication method for encoded data in this work. Even when ownership radically changes, it enables the cloud server to restrict access to updated data. While the added computational cost is negligible, this paper plot is virtually as successful as the earlier versions. The recommended system defends against attacks based on label irregularities and information trustworthiness. This approach increases the security of the proposed application to guarantee data integrity and privacy. |
---|---|
ISSN: | 2575-7288 |
DOI: | 10.1109/ICACCS57279.2023.10112974 |