Deduplication Using SHA-1 and IBE with Modified AES
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 2, February 2017

Deduplication Using SHA-1 and IBE with Modified AES

Renuka C. Deshpande, S. S. Ponde

Deduplication process is being mostly use in cloud server space to shrink the quantity of server space and accumulate network bandwidth. To eradicate duplicate pieces of repeat data, Data deduplication is exclusive data compression proposal used. To protect the confidentiality & isolation of receptive data while supporting deduplication, the convergent encryption method has been proposed to encrypt data before outsourcing. To healthier data defense, this manuscript takes the primary effort to properly deal with the difficulty of certified data deduplication. Apart from usual deduplication structure, the differential rights concept for users is further measured in replica check moreover the records itself. There are numerous novel deduplication construction supporting certified replica check in a fusion cloud architecture. Security investigations express that our proposal is secure in conditions of the characterization specified in the proposed security representation. As a evidence of conception, we implement a trial product of our future certified duplicate check scheme and conduct testbed experiments using our trial product. We will enhance security of cloud data by using symmetric algorithms with least operating cost evaluate to previous research operations.

Keywords: Deduplication, hybrid cloud, differential priviledges, Confidentiality

Edition: Volume 6 Issue 2, February 2017

Pages: 1886 - 1889

Share this Article

How to Cite this Article?

Renuka C. Deshpande, S. S. Ponde, "Deduplication Using SHA-1 and IBE with Modified AES", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20171188, Volume 6 Issue 2, February 2017, 1886 - 1889

116 PDF Views | 104 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Deduplication'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1258 - 1261

Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud

P. Narasimhulu, Jayavarthini.C

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1613 - 1618

Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing

Nancy Digra, Sandeep Sharma

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1696 - 1700

Data Security Policies in Cloud: A Survey

Kasundra Punitkumar R., Shikha J. Pachouly

Share this Article

Similar Articles with Keyword 'hybrid cloud'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 756 - 759

Cloud Computing: A New Era of IT Opportunity and Challenges

K Sampath Kumar, M Ronith, B Sanjay Krishna, Mohammed Jasam

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Similar Articles with Keyword 'Confidentiality'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article
Top