Elimination Of Repeated Data Copies With Enhanced Security In Hcloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
Intending at economically solving the trouble of deduplication with discrepancy privileges in cloud computing we regard as a hybrid cloud structural design consisting of a public cloud and a private cloud. Dissimilar existing data deduplication systems, the private cloud is occupied as a proxy to tolerate data owner/users to firmly achieve duplicate check with differential privileges. Such architecture is realistic and has concerned much attention from researchers. The data owners only outsource their data storage by employing public cloud while the data operation is handled in private cloud. A new deduplication system supporting differential duplicate check is planned under this hybrid cloud architecture where the S-CSP dwells in the public cloud. The user is only authorized to carry out the duplicate ensure for files marked with the corresponding privileges. The users without equivalent privileges cannot perform the duplicate check. Additionally such unconstitutional users cannot decrypt the cipher text even conspire with the S-CSP.
Authors and Affiliations
N Mary Joycy Deborah, R Sailaja
Face Recognition Performance Improvement by Decomposition of Local Features using Discrete Wavelet Transforms
This paper proposes a novel method of face recognition using decomposition of local features using Discrete Wavelet Transforms (DWT). The impulse for the proposed idea is with the fact that histograms DC constituent...
An Algorithm To Compute The SR Score And Parameters To Tune Its Performance
Keyword query interfaces (KQIs) for list have involved much notice in the last decade due to their suppleness and ease of use in searching and discover the data. Because any unit in a data set that enclose the query...
Detection and Prevention Of Cooperative Black Hole Attack in a MANET
A mobile ad hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices connected wirelessly. In MANETs, security plays a major role as the mobile nodes can join and leave the network random...
Recognition besides Adjustment of Inaccurate Fingerprints Matching
Biometric distinguishing proof has included noticeably for people with unique mark developing as the prevailing one. The strength of unique mark is been set up by the persistent rise of diverse types of Automated Fin...
Storage Correctness Verification and Data Regaining In Cloud
Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover users sho...