A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based

Abstract

the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data.

Authors and Affiliations

Meesala Venkata Nooka Raju| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: raju.meesala1256@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

Network Intrusion Detection Systems Using Genetic Algorithm

Intruder Detection system is so important implementations which considers all network information like temporal and spatial which make the system to build the rule for IDS. This helps for the administrator to detect...

Efficient Data Access in Disruption Tolerant Networks Using Cooperative Caching with DRAMA

Disruption Tolerant Networks (DTNs) is characterized by low node density and unpredictable node mobility. The current research efforts in DTN focus on data forward in gand reduce absence of end-toend path between sour...

A Clustering-Based Shifting Technique To Align Data Units In Web Data Bases

An increasing number of databases have become web available through HTML form based search interfaces. The data units return from the underlying database are repeatedly encoded into the result pages dynamically for h...

Probity And Speculations Yielding Model For Multi Clouds

Cloud computing is a latest trend in present scenario. Cloud computing definitely makes sense if your own security is weak, missing features of understanding and privacy. The cloud acts as a big black box, nothing in...

Dispensing Iptv Amenities Through Simulation By Enhancing Cloud Possessions

Prenent we are having virtual technologies these are failure on quality of services.The development of IPTV service delivery through cloud services is of temporary interest in many applications such as failure findi...

Download PDF file
  • EP ID EP16700
  • DOI -
  • Views 320
  • Downloads 8

How To Cite

Meesala Venkata Nooka Raju, K. LakshmiPriya (2015). A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based. International Journal of Science Engineering and Advance Technology, 3(12), 1362-0. https://europub.co.uk/articles/-A-16700