A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data.
Authors and Affiliations
Meesala Venkata Nooka Raju| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: raju.meesala1256@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India
An opportunistic routing algorithm adopts no awareness about the channel statistics and network, but practices a reinforcement learning framework in order to qualify the nodes to familiarize their routing strategies,...
A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based
the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users,...
A Novel File Search And Sharing Component In Controlled P2p Structures
In web p2p record sharing framework creating more traffic. In this framework document querying is imperative usefulness which demonstrates the execution of p2p framework. To enhance record query execution cluster the...
Effective Resource Allocation in flexible Overlay Routing
Overlay routing is the very attractive scheme that allows the improving certain properties of the routing without the need to change the standards of the current underlying routing. However, deploying overlay routing...
Individualised Recommender System Using Keywords With Efficient Similarity Computation Employing Mapreduce
The advancement in E-commerce enabled the websites to overwhelm users with numerous services. Often times, users find it a challenging task to choose the appropriate and best service from the availabe services. To pr...