A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based

Abstract

the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data.

Authors and Affiliations

Meesala Venkata Nooka Raju| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: raju.meesala1256@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

GSM Technology: Architecture, Security and Future Challenges

GSM means Global System for mobile communication. GSM is generally utilized mobile correspondence framework on the planet. GSM framework was produced as an advanced framework utilizing time division multiple access (...

A Study on Big Data analysis Environment

The use of electronics to implement IT solutions has generally known about big data since recent century. IT was use full for compute a vast applications for implementing business processes, its value intention has a...

Maximum Data Rate Determination of a Telephone Transmission Channel

The transmission channel is a medium that transfers the information from the source to the destination. So many forms of media are available; some of them are pair of wires, a coaxial cable, a radio path, or an optic...

Modeling And Biomechanical Analysis Of Human Knee Joint

The main objective of the present work is to implement the computer aided technology to study the biomechanical behavior of human knee joint which consists of Femur, Tibia, Patella, Menisci, Posterior Cruciate Ligame...

This work implements a new approach of fuzzy logic based space vector regulation with respect to the immediate torque controlled acceptance engine bolstered by four switch three stage inverter (FSTPI) to conquer the...

Download PDF file
  • EP ID EP16700
  • DOI -
  • Views 304
  • Downloads 8

How To Cite

Meesala Venkata Nooka Raju, K. LakshmiPriya (2015). A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based. International Journal of Science Engineering and Advance Technology, 3(12), 1362-0. https://europub.co.uk/articles/-A-16700