International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 245

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 2, February 2017 | Popularity: 6.8 / 10


     

Deduplication Using SHA-1 and IBE with Modified AES

Renuka C. Deshpande, S. S. Ponde


Abstract: Deduplication process is being mostly use in cloud server space to shrink the quantity of server space and accumulate network bandwidth. To eradicate duplicate pieces of repeat data, Data deduplication is exclusive data compression proposal used. To protect the confidentiality & isolation of receptive data while supporting deduplication, the convergent encryption method has been proposed to encrypt data before outsourcing. To healthier data defense, this manuscript takes the primary effort to properly deal with the difficulty of certified data deduplication. Apart from usual deduplication structure, the differential rights concept for users is further measured in replica check moreover the records itself. There are numerous novel deduplication construction supporting certified replica check in a fusion cloud architecture. Security investigations express that our proposal is secure in conditions of the characterization specified in the proposed security representation. As a evidence of conception, we implement a trial product of our future certified duplicate check scheme and conduct testbed experiments using our trial product. We will enhance security of cloud data by using symmetric algorithms with least operating cost evaluate to previous research operations.


Keywords: Deduplication, hybrid cloud, differential priviledges, Confidentiality


Edition: Volume 6 Issue 2, February 2017


Pages: 1886 - 1889



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Renuka C. Deshpande, S. S. Ponde, "Deduplication Using SHA-1 and IBE with Modified AES", International Journal of Science and Research (IJSR), Volume 6 Issue 2, February 2017, pp. 1886-1889, https://www.ijsr.net/getabstract.php?paperid=ART20171188, DOI: https://www.doi.org/10.21275/ART20171188



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1349 - 1363

IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing

Ponnarasan Krishnan

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article

Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024

Pages: 422 - 426

Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies

Ravi Jagadish

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article



Top