Security Analysis and Deduplication Using Convergent Algorithm
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 6)Publication Date: 2015-06-05
Authors : Rajkumar N Pagadi; Shubhangi D C;
Page : 1395-1398
Keywords : Security Analysis Deduplication Convergent;
Abstract
Data compression techniques such as data deduplication is used for removing duplicate copies of repeating data, it has been extensively used in cloud storage so as to reduce storage space and save bandwidth. To preserve confidentiality of sensitive data while supporting deduplication. For that purpose the convergent encryption technique has been proposed so as to encrypt the data before outsourcing. To better protect data security, the aim is to formally address the problem of authorized data deduplication. We also consider the differential privileges of users are considered in duplicate check besides the data. To support authorized duplicate check in a hybrid cloud architecture we have several new deduplication constructions. In order to demonstrate that the scheme is secure in terms of the definitions specified in the proposed security model security analysis is performed. we implement a prototype of our proposed authorized duplicate check scheme and conduct testbed experiments using our prototype. The proposed authorized duplicate check scheme sustains minimal overhead when compared to normal operations.
Other Latest Articles
- Electrical Discharge Machining Characteristics of Aluminium Metal Matrix Composites - A Review
- Spectrum Sensing Based on CP-OFDM System with Incited Cyclostationary Detector in Cognitive Radios
- The Technological Threats of Information Security Analysis in Ibrahim Babangida Library of Modibboadama University of Technology, Yola
- Prevalence of Autism Spectrum Disorders in Vitamin D Deficient or Insufficient Rickets
- CdO: Ag Films Deposited by Sol-Gel Process: A Study on their Structure and Optical Properties
Last modified: 2021-06-30 21:49:27