A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based

Abstract

the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data.

Authors and Affiliations

Meesala Venkata Nooka Raju| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: raju.meesala1256@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

Strong Location and Data Privacy with User Unlinkability In Geo Location Based Services

Increasing smart phone usage in the world apple and android providing lots of apps for mobile users. Geosocial applications provide location services to provide social interface to the physical world. Due to lack of p...

Keyword based pursuit in content rich multidimensional datasets encourages numerous novel applications and instruments. In this we consider objects that are tagged with watchwords and are inserted in a vector space. F...

Recursive Approach to the Design of a Parallel Self Timed Adder

As innovation scales down into the lower nanometer values control, postpone region and recurrence gets to be im¬portant parameters for the examination and plan of any circuits. This short exhibits a parallel single-...

MODELLING AND SIMULATION OF LOSSLESS DAMPING REDUCTION BY VECTOR CONTROLLED AC MOTOR DRIVE WITH AN EFFICIENT LC FILTER

In this paper Active damping technique is used to damp out the unwanted resonant frequency oscillations and proposed for lossless damping of vectorcontrolled ac drives with an efficient LC-Filter. This paper mainly co...

Design And Implementation of Cascaded Multilevel Inverter Topology With Reduced Number Of Components

In this paper, using H-bridge topology a general cascade multilevel inverter for the implementation of 49th level inverter and a new algorithm in generating all voltage levels for a 49th level with less number of dc...

Download PDF file
  • EP ID EP16700
  • DOI -
  • Views 297
  • Downloads 8

How To Cite

Meesala Venkata Nooka Raju, K. LakshmiPriya (2015). A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based. International Journal of Science Engineering and Advance Technology, 3(12), 1362-0. https://europub.co.uk/articles/-A-16700