To improve the efficiency of outsourced storage systems, secure deduplication mechanisms have been introduced. Among these, AES-based encryption is widely used, where packet-level messages are encrypted using a key derived from the message itself. This enables the detection of duplicate data, since identical plaintexts generate identical ciphertexts under the same deterministic setting. AES also supports combined encryption functionality and provides strong security assurances. Cloud computing has emerged as a practical solution for storing and sharing massive volumes of data over networks. Although several approaches have been proposed to ensure data security in distributed storage environments, many of them are closely tied to ciphertext-based techniques. Therefore, this paper presents a cloud-based data collection, sharing, and controlled dissemination scheme designed to preserve multi-owner privacy. In the proposed model, the data owner can securely share sensitive information with a group of authorized users through the cloud.
100
75
43
100
75
43
100
75
43
Copyright © 2026, This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC-BY-NY-SA). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Corresponding Author: P. Srinivasa Rao, psr.cse@mvgrce.edu.in
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Conflict of interest: The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
Or share your Opinion
In the state of affairs of industrialization, requirements of the international strength crisis, including environmental pollution and smart...
Academic institutions have become prominent targets for evolving cyber threats, including ransom ware, credential theft, data manipulation attacks,...
We propose a unified multimodal framework, Universal Multi-Modal Generation Enabling Any-to-Any Transformation, that enables seamless transformation between text,...
Comments(0)