A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data.
Authors and Affiliations
Meesala Venkata Nooka Raju| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: raju.meesala1256@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India
Strong Location and Data Privacy with User Unlinkability In Geo Location Based Services
Increasing smart phone usage in the world apple and android providing lots of apps for mobile users. Geosocial applications provide location services to provide social interface to the physical world. Due to lack of p...
Keyword based pursuit in content rich multidimensional datasets encourages numerous novel applications and instruments. In this we consider objects that are tagged with watchwords and are inserted in a vector space. F...
Recursive Approach to the Design of a Parallel Self Timed Adder
As innovation scales down into the lower nanometer values control, postpone region and recurrence gets to be im¬portant parameters for the examination and plan of any circuits. This short exhibits a parallel single-...
MODELLING AND SIMULATION OF LOSSLESS DAMPING REDUCTION BY VECTOR CONTROLLED AC MOTOR DRIVE WITH AN EFFICIENT LC FILTER
In this paper Active damping technique is used to damp out the unwanted resonant frequency oscillations and proposed for lossless damping of vectorcontrolled ac drives with an efficient LC-Filter. This paper mainly co...
Design And Implementation of Cascaded Multilevel Inverter Topology With Reduced Number Of Components
In this paper, using H-bridge topology a general cascade multilevel inverter for the implementation of 49th level inverter and a new algorithm in generating all voltage levels for a 49th level with less number of dc...