Competent Dependable Convergent Key Management for Reliable Deduplication
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
De-Duplication enhances Storage and data transmission effectiveness is contradictory with conventional encryption. In conventional model encryption requires diverse clients to encode their own information with their own expert key, in this manner indistinguishable information duplicates of distinctive clients will prompt diverse figure writings, making de-duplication incomprehensible. Each such duplicate can be characterized in view of diverse granularities: it may allude to either an entire document (i.e., record level deduplication), or information piece (i.e., square level deduplication). To applying deduplication to client information to spare support cost in cloud. Aside from typical encryption and unscrambling procedure we have proposed Master key idea with DeKey idea. For Encryption and Decryption we have utilized Triple Data Encryption Standard (3-DES) Algorithm where the plain content is encoded triple times with the key so that the information is secure and solid from programmers. We diminished the expense and time in transferring and downloading with storage room.
Authors and Affiliations
Sharmistha Biswas , S. Durga Prasad
Exploration Distribution And Appliances Problems In Mobile Sensor Networks
This paper goes for examining different exploration issues of executing the portable entryway to coordinate remote sensor system (WSN) and different systems and another strategy for actualizing cell telephones itself...
Streaming of High Quality videos using Cloud
Recently many mobile entertaining applications have been launched, but most popular app like Facebook, Twitter, YouTube have large demand among users. But these media applications are limited by the unstable wireless...
E-IHRB Decoder Architectures for Non-Binary LDPC Codes
In the information theory, the non- binary low density parity check (NB-LDPC) code is a linear error correcting code, a method of transmitting message over a noisy transmission channel. LDPCcodes are capacityapproachi...
SSUT: A new approach for privacy of source unknown in wireless sensor networks
Sensor Networks which is different compared to other networks which is deployed in unattended area used to sense and monitor the events that are reported to sink. But the locations of events delivered by sensor networ...
Recent Issues and Its Quick Fixes for Various Data Repositories
The aim of this study was to assess the issues and their quick fixes of databases. But the database accuracy has a trickle down effect in most implementations. This paper proposes the overall guidance about the techni...