A Mixture Cloud Approach For Safe Official Deduplications

Abstract

Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machine. But the thing is user don’t have physical control over the outsourced data. The need is to share data securely among users. The cloud service provider and users authentication is necessary to make sure no loss or leak of users data. Privacy preserving in cloud is important make sure the users identity is not revealed to everyone. On cloud anyone can share data as much they want to i.e. only selected content can be shared. Cryptography helps the data owner to share the data to in safe way. So user encrypts data and uploads on server. Different encryption and decryption keys are generated for different data. The encryption and decryptioorised n keys may be different for different set of data. Only those set of decryption keys are shared that the selected data can be decrypted. Here a publickey cryptosystems which generate a ciphertext which is of constant size. So that to transfer the decryption rules for number of ciphertext. The difference is one can collect a set of secret keys and make them as small size as a single key with holding the same ability of all the keys that are formed in a group. This compact aggregate key can be efficiently sent to others or to be stored in a smart card with little secure storage.

Authors and Affiliations

G Vinod Kumar, S Babu

Keywords

Related Articles

Performance Issues of WMNs by implementing Coordinator in IEEE 802.11 Networks

The wireless networking is the current trend that most of the peoples that used and fastly grow in the world. The number of topologies has been used in this network and few are Star, Bus , Mesh etc. but the Mesh Topol...

A Novel approach on ɸ - Disposition Pulse Width Modulation for Modular Multilevel Inverter

In this project implemented a novel approach in the modulation technique based on selective virtual loop mapping, to attain dynamic capacitor voltage balance without any compensated signal.An improvised proposed metho...

Survey on Different Data Hiding Techniques

Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important...

Construction of Covert Channel Using Data Hiding Mechanism In Ipv4

Covert channel is a way of abstracting the information and hiding the information, in such a way that the reader should not analyse the hidden information and transmit the data to the destination. The covert techniqu...

Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs

This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with i...

Download PDF file
  • EP ID EP28158
  • DOI -
  • Views 253
  • Downloads 1

How To Cite

G Vinod Kumar, S Babu (2015). A Mixture Cloud Approach For Safe Official Deduplications. International Journal of Research in Computer and Communication Technology, 4(3), -. https://europub.co.uk/articles/-A-28158