A Data De-duplication Procedure To Protect The Data Security

Abstract

Data de-duplication carry a lot of benefits, security and privacy concerns arise as users’ sensitive data are vulnerable to both inside and outside attacks. Traditional encryption, while as long as data confidentiality, is unsuited with data deduplication. Particularly, traditional encryption necessitates different users to encrypt their data with their own keys. Thus, identical data copies of different users will escort to different cipher texts, manufacture deduplication impracticable. To superior guard data security, this paper makes the initial challenge to officially address the dilemma of authorized data deduplication. We implement a prototype of our proposed authorized duplicate check format and manner test bed experiments using our prototype.

Authors and Affiliations

R. Bindu Madhavi| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada,Visakhapatnam ,AP, India, K. Satya Narayana Murthy| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada,Visakhapatnam ,AP, India

Keywords

Related Articles

Discretion Preservative Itinerant Health Scrutinising By Haze Succour

Haze-assisted mobile health (mHealth) monitoring,which applies the prevailing mobile communications and Haze computing technologies to provide feedback decision support, has been considered as a revolutionary approac...

Legacy Authentication Methods Preventing Key logging Attacks

The objective is not protected the authentication process against the shoulder surfing attacker who be able to see or cooperation at the same time both devices over the shoulder, but quite to make it hard forthe oppo...

Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism

The term that flourished in the IT industry is the Cloud Computing. Inspired and Motivated by the tremendous growth and the huge success of cloud, we propose a new decentralized access control scheme for secure data...

We propose another revocable IBE plot with a cloud revocation authority (CRA) to unravel the two inadequacies, to be specific, the execution is essentially enhanced and the CRA holds just a framework mystery for ever...

3d Modeling and Detailing of Silumin Piston With Static Analysis

Piston is the part of engine which converts heat and pressure energy liberated by fuel combustion into mechanical works. Engine piston is the most complex component among the automotives. Weight reduction has been ga...

Download PDF file
  • EP ID EP16820
  • DOI -
  • Views 269
  • Downloads 5

How To Cite

R. Bindu Madhavi, K. Satya Narayana Murthy (2016). A Data De-duplication Procedure To Protect The Data Security. International Journal of Science Engineering and Advance Technology, 4(10), 605-608. https://europub.co.uk/articles/-A-16820