Secure Public Cloud Authorization & De-Duplication Using Signature Based Key Policy and ECC
As the rapid data expansion of data most current years, cloud computing has turn out to be one of the furthermost
accepted area in IT industry with considers to cost, proficient use of computing possessions for example storage space and
system bandwidth in the cloud computing communications. Data deduplication refers to a method that reduces the
unnecessary data on the storage and transmitting on the network, and is think about to be one of the most-enabling storage
technologies that presents well-organized resource exploitation in the cloud computing. On the additional hand, be
appropriating data deduplication acquires protection vulnerabilities in the cloud storage method so that untrusted entities
including a cloud server or unauthorized users may break data confidentiality, privacy and integrity on the outsourced data.
It is difficult to resolve the difficulty of data defense and confidentiality regarding data de-duplication, but positively
essential for presenting amature and established cloud storage service. Here in this paper for providing Data Security
Differential human rights of users in the Duplicate ensure. Also a Hybrid Cloud Architecture is implemented in which the
Duplicate-check tokens of files are generated by the private cloud servers with private keys. The methodology adopted here
for token creation introduces only minimal overhead during the entire upload process and is negligible for moderate file
Index Terms- Cloud computing, Data Deduplication, Data Storage, Remote Data, Elliptic Curves.