A Data De-duplication Procedure To Protect The Data Security
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 10
Abstract
Data de-duplication carry a lot of benefits, security and privacy concerns arise as users’ sensitive data are vulnerable to both inside and outside attacks. Traditional encryption, while as long as data confidentiality, is unsuited with data deduplication. Particularly, traditional encryption necessitates different users to encrypt their data with their own keys. Thus, identical data copies of different users will escort to different cipher texts, manufacture deduplication impracticable. To superior guard data security, this paper makes the initial challenge to officially address the dilemma of authorized data deduplication. We implement a prototype of our proposed authorized duplicate check format and manner test bed experiments using our prototype.
Authors and Affiliations
R. Bindu Madhavi| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada,Visakhapatnam ,AP, India, K. Satya Narayana Murthy| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada,Visakhapatnam ,AP, India
Enhanced Protection for Multi-axle Vehicles
The world is flourishing with new innovation in the field of science and technologies. We are very proud of this technical growth. It’s become true, but sometimes these technologies are misused for destructions. Th...
This paper Proposed another present control topology for network associated based circulated age (DG), which encourages the DG to trade a sinusoidal current into the utility matrix in spite of the mutilated lattice vo...
Switching Activity Reduction Technique In Soc Testing
This paper discusses the generation Pseudo Random number generation using Low Power Linear Feedback Shift Resister (LFSR) which is more suitable for Built-In-Test (BIT) structures used for testing of VLSI circuits. B...
Fast Keyword Search Assumption In The Random Oracle (RO) Model
This proposes searchable public key ciphertexts with hidden structures (SPCHS) for keyword seek as quickly as conceivable without giving up semantic security of the encoded keywords. In SPCHS, all keyword searchable...
An Improved Performance Of Pid And Fuzzy Controller Based Sapf For Wind And Solar Power Generation
Amid the previous existences a while, fuzzy controller depends on fuzzy logic included manages in a sure level of ideas can't be communicated as the " genuine" or "false" however a bit "in part genuine" are most dyna...