International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 282

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.3 / 10


     

Security Analysis and Deduplication Using Convergent Algorithm

Rajkumar N Pagadi, Dr. Shubhangi D C


Abstract: Data compression techniques such as data deduplication is used for removing duplicate copies of repeating data, it has been extensively used in cloud storage so as to reduce storage space and save bandwidth. To preserve confidentiality of sensitive data while supporting deduplication. For that purpose the convergent encryption technique has been proposed so as to encrypt the data before outsourcing. To better protect data security, the aim is to formally address the problem of authorized data deduplication. We also consider the differential privileges of users are considered in duplicate check besides the data. To support authorized duplicate check in a hybrid cloud architecture we have several new deduplication constructions. In order to demonstrate that the scheme is secure in terms of the definitions specified in the proposed security model security analysis is performed. we implement a prototype of our proposed authorized duplicate check scheme and conduct testbed experiments using our prototype. The proposed authorized duplicate check scheme sustains minimal overhead when compared to normal operations.


Keywords: Security Analysis Deduplication Convergent


Edition: Volume 4 Issue 6, June 2015


Pages: 1395 - 1398



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Rajkumar N Pagadi, Dr. Shubhangi D C, "Security Analysis and Deduplication Using Convergent Algorithm", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 1395-1398, https://www.ijsr.net/getabstract.php?paperid=SUB155591, DOI: https://www.doi.org/10.21275/SUB155591



Similar Articles

Downloads: 186 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 176 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 656 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article



Top