This document summarizes a research paper that proposes methods to enhance security when using cloud computing. It discusses how cloud computing breaks traditional security boundaries since data resides outside an organization's control. The paper presents two secure systems called Sec Cloud and Sec Cloud+ that aim to provide integrity auditing and deduplication of encrypted files on the cloud.
Sec Cloud encrypts plain data files before performing integrity auditing, achieving both functions without revealing file contents. Sec Cloud+ manages deduplication on encrypted files, performing operations directly on secure files. The proposed methodology encrypts a user's images using masks from other images before outsourcing to the cloud for storage and processing. This adds an extra layer of security while maintaining the benefits of