Downloads: 116 | Views: 245
Review Papers | Computer Science & Engineering | India | Volume 6 Issue 2, February 2017 | Popularity: 6.8 / 10
Deduplication Using SHA-1 and IBE with Modified AES
Renuka C. Deshpande, S. S. Ponde
Abstract: Deduplication process is being mostly use in cloud server space to shrink the quantity of server space and accumulate network bandwidth. To eradicate duplicate pieces of repeat data, Data deduplication is exclusive data compression proposal used. To protect the confidentiality & isolation of receptive data while supporting deduplication, the convergent encryption method has been proposed to encrypt data before outsourcing. To healthier data defense, this manuscript takes the primary effort to properly deal with the difficulty of certified data deduplication. Apart from usual deduplication structure, the differential rights concept for users is further measured in replica check moreover the records itself. There are numerous novel deduplication construction supporting certified replica check in a fusion cloud architecture. Security investigations express that our proposal is secure in conditions of the characterization specified in the proposed security representation. As a evidence of conception, we implement a trial product of our future certified duplicate check scheme and conduct testbed experiments using our trial product. We will enhance security of cloud data by using symmetric algorithms with least operating cost evaluate to previous research operations.
Keywords: Deduplication, hybrid cloud, differential priviledges, Confidentiality
Edition: Volume 6 Issue 2, February 2017
Pages: 1886 - 1889
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024
Pages: 422 - 426Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies
Ravi Jagadish
Downloads: 100
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1709 - 1712A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System
Nara Venkata Surendra Reddy, DLS Reddy