Review Papers | Computer Science & Engineering | India | Volume 6 Issue 2, February 2017
Deduplication Using SHA-1 and IBE with Modified AES
Renuka C. Deshpande, S. S. Ponde
Deduplication process is being mostly use in cloud server space to shrink the quantity of server space and accumulate network bandwidth. To eradicate duplicate pieces of repeat data, Data deduplication is exclusive data compression proposal used. To protect the confidentiality & isolation of receptive data while supporting deduplication, the convergent encryption method has been proposed to encrypt data before outsourcing. To healthier data defense, this manuscript takes the primary effort to properly deal with the difficulty of certified data deduplication. Apart from usual deduplication structure, the differential rights concept for users is further measured in replica check moreover the records itself. There are numerous novel deduplication construction supporting certified replica check in a fusion cloud architecture. Security investigations express that our proposal is secure in conditions of the characterization specified in the proposed security representation. As a evidence of conception, we implement a trial product of our future certified duplicate check scheme and conduct testbed experiments using our trial product. We will enhance security of cloud data by using symmetric algorithms with least operating cost evaluate to previous research operations.
Keywords: Deduplication, hybrid cloud, differential priviledges, Confidentiality
Edition: Volume 6 Issue 2, February 2017
Pages: 1886 - 1889
How to Cite this Article?
Renuka C. Deshpande, S. S. Ponde, "Deduplication Using SHA-1 and IBE with Modified AES", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20171188, Volume 6 Issue 2, February 2017, 1886 - 1889
116 PDF Views | 104 PDF Downloads
Similar Articles with Keyword 'Deduplication'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1685 - 1688An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture
Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1258 - 1261Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud
P. Narasimhulu, Jayavarthini.C
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 1613 - 1618Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
Nancy Digra, Sandeep Sharma
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1696 - 1700Data Security Policies in Cloud: A Survey
Kasundra Punitkumar R., Shikha J. Pachouly
Similar Articles with Keyword 'hybrid cloud'
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 756 - 759Cloud Computing: A New Era of IT Opportunity and Challenges
K Sampath Kumar, M Ronith, B Sanjay Krishna, Mohammed Jasam
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1685 - 1688An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture
Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Similar Articles with Keyword 'Confidentiality'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2457 - 2462Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation
Rashmi Kadu, Sonali Patil
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3033 - 3035A Survey on Security and Privacy Based Location Based Recompense Scheme
Prema. S. Patil Wankhede, M. K Kodmelwar