Secure Authorised De-duplication using Convergent Encryption Technique
Journal: International Journal of Advanced Networking and Applications (Vol.7, No. 06)Publication Date: 2016-05-30
Authors : Sangeetha. B; E.S.K.Vijay Anand;
Page : 2958-2962
Keywords : Re-duplicate; empower duplicate validity; combination cloud;
Abstract
Cloud computing means retrieve and storing information and programs over the Internet instead of your computer's hard drive. To protect confidentiality of the perceptive data while supporting de-duplication data is encrypted by the projected convergent encryption method before out sourcing. It makes the first attempt to properly address the problem of authorized data deduplication. We also present some new deduplication constructions supporting authorized duplicate in cloud using symmetric algorithm. Data deduplication is one of the techniques which used to solve the repetition of data. The deduplication techniques are commonly used in the cloud server for reducing the space of the server. To prevent the unauthorized use of data accessing and generate duplicate data on cloud the encryption technique to encrypt the data before stored on cloud server.
Other Latest Articles
- REGRESSION-DIFFERENTIAL MODEL OF INTERNET USERS NUMBER DYNAMICS IN RUSSIA
- Improved Cell Coverage in Hilly Areas using Cellular Antennas
- PROGNOSTICATION OF CARS MADE IN RUSSIA SALES IN RUSSIAN FEDERATION BY REGRESSION-DIFFERENTIAL MODELS
- POLITICO-ECONOMIC ASPECTS OF INTERMODAL TRANSPORT DEVELOPMENT IN THE RUSSIAN FEDERATION WITH USE OF FOREIGN EXPERIENCE (FOR EXAMPLE A.S.ČESKÉ DRÁHY, JSC "RUSSIAN RAILWAYS")
- Lean as Agile methodology ? A Study
Last modified: 2016-07-15 16:48:37