A Data De-duplication Procedure To Protect The Data Security

Abstract

Data de-duplication carry a lot of benefits, security and privacy concerns arise as users’ sensitive data are vulnerable to both inside and outside attacks. Traditional encryption, while as long as data confidentiality, is unsuited with data deduplication. Particularly, traditional encryption necessitates different users to encrypt their data with their own keys. Thus, identical data copies of different users will escort to different cipher texts, manufacture deduplication impracticable. To superior guard data security, this paper makes the initial challenge to officially address the dilemma of authorized data deduplication. We implement a prototype of our proposed authorized duplicate check format and manner test bed experiments using our prototype.

Authors and Affiliations

R. Bindu Madhavi| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada,Visakhapatnam ,AP, India, K. Satya Narayana Murthy| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada,Visakhapatnam ,AP, India

Keywords

Related Articles

Enhanced Protection for Multi-axle Vehicles

The world is flourishing with new innovation in the field of science and technologies. We are very proud of this technical growth. It’s become true, but sometimes these technologies are misused for destructions. Th...

This paper Proposed another present control topology for network associated based circulated age (DG), which encourages the DG to trade a sinusoidal current into the utility matrix in spite of the mutilated lattice vo...

Switching Activity Reduction Technique In Soc Testing

This paper discusses the generation Pseudo Random number generation using Low Power Linear Feedback Shift Resister (LFSR) which is more suitable for Built-In-Test (BIT) structures used for testing of VLSI circuits. B...

Fast Keyword Search Assumption In The Random Oracle (RO) Model

This proposes searchable public key ciphertexts with hidden structures (SPCHS) for keyword seek as quickly as conceivable without giving up semantic security of the encoded keywords. In SPCHS, all keyword searchable...

An Improved Performance Of Pid And Fuzzy Controller Based Sapf For Wind And Solar Power Generation

Amid the previous existences a while, fuzzy controller depends on fuzzy logic included manages in a sure level of ideas can't be communicated as the " genuine" or "false" however a bit "in part genuine" are most dyna...

Download PDF file
  • EP ID EP16820
  • DOI -
  • Views 263
  • Downloads 5

How To Cite

R. Bindu Madhavi, K. Satya Narayana Murthy (2016). A Data De-duplication Procedure To Protect The Data Security. International Journal of Science Engineering and Advance Technology, 4(10), 605-608. https://europub.co.uk/articles/-A-16820