ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Authorised De-duplication using Convergent Encryption Technique

Journal: International Journal of Advanced Networking and Applications (Vol.7, No. 06)

Publication Date:

Authors : ; ;

Page : 2958-2962

Keywords : Re-duplicate; empower duplicate validity; combination cloud;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing means retrieve and storing information and programs over the Internet instead of your computer's hard drive. To protect confidentiality of the perceptive data while supporting de-duplication data is encrypted by the projected convergent encryption method before out sourcing. It makes the first attempt to properly address the problem of authorized data deduplication. We also present some new deduplication constructions supporting authorized duplicate in cloud using symmetric algorithm. Data deduplication is one of the techniques which used to solve the repetition of data. The deduplication techniques are commonly used in the cloud server for reducing the space of the server. To prevent the unauthorized use of data accessing and generate duplicate data on cloud the encryption technique to encrypt the data before stored on cloud server.

Last modified: 2016-07-15 16:48:37