CSEIT1722252 | Received : 10 April 2017 | Accepted : 20 April 2017 | March-April-2017 [(2)2: 832-836] International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT | Volume 2 | Issue 2 | ISSN : 2456-3307 832 A Secure Verifiable Storage Deduplication Scheme on Bigdata in Cloud S. Indirakumari, A. Thilagavathy Department of Computer Science and Engineering, R.M.K Engineering College, Chennai, Tamil Nadu, India ABSTRACT Cloud Computing is a emerging technology where we can get platform as a service, Software as a service, infrastructure as a service, while getting storage as a service from cloud. Memory management are very most important in cloud computing. In existing paper user can upload text files only and not a secured. In existing paper we propose a user can upload all type of files (jpg, gif, png, audio, video, pdf, ppt) using deduplication technology. We propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re- encryption. It is commonly used to reduce the space and bandwidth requirements of service by eliminating redundant data and storing only a single copy of file using cloud service provider. Here we propose secure deduplication to avoid the same files uploaded multiple times. Keywords : Deduplication, Big Data, Cloud Computing, Access Control, Proxy Re-Encryption, Memory Management I. INTRODUCTION Cloud computing is an innovative service mode. Through the network to the required resources (hardware, platform, and software), virtual integration into a reliable and high performance of computing platform. In cloud computing, all user data are stored in the cloud resources like cloud nodes. The Cloud computing is the use of computing resources that are delivered as a service over a network. The resources are made available on the internet as managed third-party services. One of the most fundamental services offered by cloud providers is data storage. The data is available at any time because the cloud computing is an internet based computing. The cloud service providers are providing various services to the users. The conclusion distribute to the user through the network when the user needed the security. Although cloud computing has aim to mature service model, and have large commercial, cloud computing is still facing many problems[8]. Cloud Computing still facing the number of major challenges: Safety, Stability and Performance issue. Including the security and memory management problem concerns the most. A real cloud computing security incidents have profound acknowledge the urgency of cloud security and authentication issues, example for users cannot access to their email and other personal data. More important, due to the technical personnel not to be make backups of their data, conclusion of Microsoft cannot recover data. Although the cloud storage service can realize multiple copy of files fault tolerance and backup automatically, it is also guarantee 100 percent security and authentication. Deduplication has proved to achieve high cost savings storage needs for backup applications. In this paper, we propose a scheme based on data ownership challenge and Proxy Re-Encryption (PRE) to manage encrypted data storage with deduplication[5][8]. Specifically, the contributions of this paper can be summarized below: 1. Our scheme can flexibly support data sharing with deduplication even when the data holders or offline. 2. We propose verify data ownership and check duplicate storage with secure challenge and bigdata support. 3. We integrate cloud data deduplication with access control.