A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based

Abstract

the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data.

Authors and Affiliations

Meesala Venkata Nooka Raju| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: raju.meesala1256@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

A Novel Optimal routing using Hop-by-Hop Adaptive linking

I am presenting the first of its kind project, the first link-state routing solution carrying traffic through packetswitched networks. At each node, for every other node, the algorithm independently and iteratively upd...

Improving Power Quality Of Distribution Grid Using An Ultracapacitor Integrated With Power Conditioner

Entrance of different sorts of disseminated vitality assets (DERs) like sun oriented, wind, and module half and half electric vehicles (PHEVs) onto the dispersion lattice is on the ascent. There is a comparing increme...

IoT Based Smart Trash /Garbage Collection System

Waste Management is one of the major problem in our day to day life. The current observation is that trash-bin is not efficiently managed, it is not emptied from time to time thus leading to a critical situation whic...

Clustered Node Based Load Balancing In Distributed Environment

Cloud computing having tremendous growth on recent years but it is not segregation on shared clouds. Distributed file systems are key building blocks for cloud computing applications based on the Map Reduce programmi...

Semi Z Source Inverter (QZSI) an improvement to Z Source Inverter (ZSI). The benefits of QZSI can be recorded as lower segment appraisals, decreases exchanging ripples, reduced segment tally and rearranged control te...

Download PDF file
  • EP ID EP16700
  • DOI -
  • Views 323
  • Downloads 8

How To Cite

Meesala Venkata Nooka Raju, K. LakshmiPriya (2015). A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based. International Journal of Science Engineering and Advance Technology, 3(12), 1362-0. https://europub.co.uk/articles/-A-16700