ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Deduplication Using SHA-1 and IBE with Modified AES

Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 2)

Publication Date:

Authors : ; ;

Page : 1886-1889

Keywords : Deduplication; hybrid cloud; differential priviledges; Confidentiality;

Source : Downloadexternal Find it from : Google Scholarexternal


Deduplication process is being mostly use in cloud server space to shrink the quantity of server space and accumulate network bandwidth. To eradicate duplicate pieces of repeat data, Data deduplication is exclusive data compression proposal used. To protect the confidentiality& isolation of receptive data while supporting deduplication, the convergent encryption method has been proposed to encrypt data before outsourcing. To healthier data defense, this manuscript takes the primary effort to properly deal with the difficulty of certified data deduplication. Apart from usual deduplication structure, the differential rights concept for users is further measured in replica check moreover the records itself. There are numerous novel deduplication construction supporting certified replica check in a fusion cloud architecture. Security investigations express that our proposal is secure in conditions of the characterization specified in the proposed security representation. As a evidence of conception, we implement a trial product of our future certified duplicate check scheme and conduct testbed experiments using our trial product. We will enhance security of cloud data by using symmetric algorithms with least operating cost evaluate to previous research operations.

Last modified: 2021-06-30 17:48:27