A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data.
Authors and Affiliations
Meesala Venkata Nooka Raju| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: raju.meesala1256@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India
Kernel based Design on Industrial Automation
In this paper presented an Industrial based automation with real-time approach by using kernel objects. ARM7 processor chip was used for real-time scheduling purpose. In this an embedded resistance-temperature charac...
Blending Cloud Mode With Well-Balanced Recognised Redundancy Elimination Technique
Data deduplication is a critical system in support dispose of excess information as an option of enthralling records; it provisions simply distinct copy of file. Together with the whole associations stockpiling patte...
Emotional Based Smart Accessing and Controlling For Autism Spectrum Disordered People
Autism (or) Autism Spectrum Disorder (ASD) may be viewed as a neural developmental disability that can affect social interaction, language (or) behavioural skills of a person. Most autistic persons show symptoms of...
Active Cloud Valuing for Revenue Expansion
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Sharing data in a multiowner manner while preserving data and identity...
Facet Based Estimation Polling From Customer Reviews
Reputation-based belief systems are broadly used in e-Trade applications, and response ratings are aggregated to figure out traders’ reputation grades. The “all good reputation†problem, however, is prevalent i...