A Hybrid Cloud Approach for Secure Authorized Deduplication
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 2)Publication Date: 2016-02-01
Authors : Sunita S. Velapure; S. S. Barde;
Page : 2217-2219
Keywords : cloud;
Abstract
Data deduplication is one among vital knowledge compression techniques for eliminating duplicate copies of repetition knowledge, and has been wide employed in cloud storage to cut back the amount of storage space and save bandwidth. The main advantage of using cloud storage from the customers expectation view is that customers will scale back their expenditure in buying and maintaining storage infrastructure whereas solely paying for the quantity of storage requested, which may be scaled-up and down upon demand. To protect the confidentiality of sensitive knowledge whereas supporting deduplication, the focused secret writing technique has been planned to encrypt the information before outsourcing. For raised shield knowledge security, this paper makes the primary plan to formally address the matter of licensed knowledge deduplication. Completely different from ancient deduplication systems, the differential privileges of users area unit more thought-about in duplicate check besides the info itself. Addition to this we present many new deduplication constructions supporting licensed duplicate check in a hybrid cloud design. Security analysis demonstrates that our theme is secure in terms of the definitions as per the planned security model. As a proof of construct, we have a goal to implement a paradigm of our planned licensed duplicate check theme and conduct test bed experiments using our paradigm. We have a goal to show that our planned licensed duplicate check theme incurs comparatively less overhead compared to traditional operations.
Other Latest Articles
- Isolated Left Ventricular Noncompaction in a 25 Year Old Male
- Enhancement in Growth and Yield of Ashwagandha (Withania Somnifera (L.) Dunal) by Counteracting Effect of Infrared Supplemented with Ultraviolet-B Radiation
- Impact of Firewalls on IEEE.802.11a, b, g, n WiFi Releases Networks
- Availability of Physical Facilities in Colleges of Education in South East Nigeria
- Prediction of Future Trends in Capital Markets using Mining Methodologies
Last modified: 2021-07-01 14:31:22