A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based

Abstract

the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data.

Authors and Affiliations

Meesala Venkata Nooka Raju| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: raju.meesala1256@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

Dispensing Iptv Amenities Through Simulation By Enhancing Cloud Possessions

Prenent we are having virtual technologies these are failure on quality of services.The development of IPTV service delivery through cloud services is of temporary interest in many applications such as failure findi...

The fundamental target of mathematics instruction is to invigorate one's instinct and logical point of view. Since the instinct is fuzzy, one can't be kept to two– esteemed logical considering. There ought to be som...

Fast Nearest Neighbour Search Aims At Optimizing Different Objective Functions Using Si- Index

Several modern applications call for novel forms of queries that aspire to find objects pleasing both a spatial predicate and a predicate on their associated texts. The significance of spatial databases is reflected...

Empowering Elegant Cloud Services Owing To Remote Signification

We create cloud-helped remote detecting systems for empowering dispersed agreement estimation of obscure parameters in a given geographic range. We first propose an appropriated sensor system virtualization calculati...

Implementation of An Efficient Gate Level Modified Square-Root Carry Select Adder Using HDL

Contribution of this work is reduce the area and power of the CSLA by a simple gate level modification. Based on this modification CSLA architecture have been developed and compared with the regular SQRT CSLA archite...

Download PDF file
  • EP ID EP16700
  • DOI -
  • Views 317
  • Downloads 8

How To Cite

Meesala Venkata Nooka Raju, K. LakshmiPriya (2015). A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based. International Journal of Science Engineering and Advance Technology, 3(12), 1362-0. https://europub.co.uk/articles/-A-16700