Assiatant Professor& Professor, Department of CSE, Nehru Institute of Technology, Coimbatore, Tamil Nadu, India
Data mining brings forth lot of information extraction security and privacy concerns for user's sensitive data and it ensures security to both inside and outside attacks in cloud storage. Traditional encryption, while providing data confidentiality, is incompatible with data Deduplication. So for more advanced security it requires a stronger encryption system. Traditional encryption allows different users to encrypt their data with their own keys. Thus, identical data of different users leads to attaining different cipher texts; this affects deduplication of identical data. Convergent encryption has been suggested in order to enforce data confidentiality for making Deduplication feasible. It encrypts or decrypts a data copy with a convergent key, A cryptographic hash value is generated by computing the contents of the data, which are uploaded. After generating the key and encryption of data, users gain the keys and send back the cipher text to the storage. Since the encryption operation is deterministic and obtained by comparing the actual data, identical data copies will generate the same convergent key and hence the same Ciphertext. Data Deduplication has been a conventional method in maintaining validity in the files and to remove same data files. It helps to reduce the amount of storage space and save bandwidth during upload operation. To ensure the confidentiality of sensitive data while supporting Deduplication, the convergent encryption technique has been suggested to encrypt the data before outsourcing or deploying. The objective is for making the better environment for data security and makes the attempt to formally address the problem of authorized data Deduplication in Cloud Storage.