A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based

Abstract

the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data.

Authors and Affiliations

Meesala Venkata Nooka Raju| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: raju.meesala1256@gmail.com, K. LakshmiPriya| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

The Associated Reassurance Endorsement in Separated Web Search

Personalized web search (PWS) is a general classification of inquiry methods going for giving distinctive indexed lists to various clients or compose query items diversely for every client, based upon their advantage...

A Novel System for Privacy-Preserving Access Control for Relational Data with Accuracy

Access Control is a set of controls to restrict access to certain resources. If we think about it, access controls are everywhere around us. A door to your room, the guards allowing you to enter the office building o...

Speech Emotion Verification Using Emotion Variance And Discriminate Scale Frequency Maps

The problems of emotion variances and emotion blending are solved using the emotion verification system. In this methodology consists of two parts. The first part, feature extraction is used to lessen the huge input...

We introduce the Contributory Broadcast Encryption (ConBE) primitive, which is a half and half of GKA and BE. Contrasted with its preparatory Asiacrypt, this gives complete security proofs, outlines the need of the a...

An Additive Order And Privacy Preserving Function Family (AOPPF)

The plentiful benefits of cloud computing, for privacy concerns, individuals and enterprise users are disinclined to outsource their susceptible data, including emails, personal health records and government confiden...

Download PDF file
  • EP ID EP16700
  • DOI -
  • Views 278
  • Downloads 8

How To Cite

Meesala Venkata Nooka Raju, K. LakshmiPriya (2015). A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based. International Journal of Science Engineering and Advance Technology, 3(12), 1362-0. https://europub.co.uk/articles/-A-16700