A Data De-duplication Procedure To Protect The Data Security
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 10
Abstract
Data de-duplication carry a lot of benefits, security and privacy concerns arise as users’ sensitive data are vulnerable to both inside and outside attacks. Traditional encryption, while as long as data confidentiality, is unsuited with data deduplication. Particularly, traditional encryption necessitates different users to encrypt their data with their own keys. Thus, identical data copies of different users will escort to different cipher texts, manufacture deduplication impracticable. To superior guard data security, this paper makes the initial challenge to officially address the dilemma of authorized data deduplication. We implement a prototype of our proposed authorized duplicate check format and manner test bed experiments using our prototype.
Authors and Affiliations
R. Bindu Madhavi| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada,Visakhapatnam ,AP, India, K. Satya Narayana Murthy| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada,Visakhapatnam ,AP, India
The Effect of Aggregate Gradation on Design Mix using Modified Bitumen
Pavements undergo different type of stresses through out there life. Out of which rutting and fatigue are major distresses. To combat these problematic aspects of roads we have to deal from the root level of design m...
Huddling For Anonymization Of Compacted And Disseminated Public Systems
Social network: a social structure consists of nodes and ties. Noes are the individual actors within the networks May be different kinds May have attributes, labels or classes Ties are the relationships between the a...
Effective Resource Allocation in flexible Overlay Routing
Overlay routing is the very attractive scheme that allows the improving certain properties of the routing without the need to change the standards of the current underlying routing. However, deploying overlay routing...
Kernel based Design on Industrial Automation
In this paper presented an Industrial based automation with real-time approach by using kernel objects. ARM7 processor chip was used for real-time scheduling purpose. In this an embedded resistance-temperature charac...
Iris recognition Using Fast Walsh Hadamard Transform Based feature Space
The significance of Iris detection and recognition in area of bioinformatics and pattern recognition has been increased from last few decades. Looking at the importance of Iris detection and recognition, we propose a...