Improving Security for De-Duplication System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Removing duplicate data is nothing but Deduplication. De-duplication system is used in cloud computing to degrade storage space and the bandwidth of cloud. In this paper introduce some new algorithm that used for de duplication .We propose distributed systems with higher consistency in which the data chunks are sprade across many cloud servers. The security requirements of data are also achieved by introducing a deterministic secret sharing in distributed storage systems, instead of using convergent encryption as in previous systems. In this paper introduced new algorithms for de-duplication system. Cryptographic hash functions are generally used for the verification of data integrity. This paper provides an implementation of a newly selected cryptographic hash algorithm called Secure Hash Algorithm – Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model.
Authors and Affiliations
Ms. Ranjana Phapale, Prof. B. S. Chunchure
Harmonic Injection Technique to Reduce Harmonic
A harmonic injection technique, which reduces theline frequency harmonics of the single switch three-phase boost rectifier, has been implemented. In this method, a periodic voltage is injected in the control circuit to...
US State Health and Human Services Integrated Eligibility System
The Temporary Assistance for Needy Families (TANF) [1] is one of the United States of America’s assistance programs. It is an Income and Employment Support program that provides temporary financial assistance for pregna...
Practical and FEA Result Analysis of Selected Casement and Sliding Windows
Glass is used for huge number of applications. But normally glass is the main part of the windows. Nowadays the walls of the building consists lot of glasses on the behalf of the packed walls. There are two types of win...
Face Recognition with SIFT Algorithm for Attendance Monitoring
The Face Recognition is an integral part of biometrics. In biometrics, basic traits of human are used to extract information and use that information and data for other application. The SIFT [1] algorithm takes a croppe...
Agile Manufacturing: A Case Study in India
Agile manufacturing is a new concept in manufacturing intended to improve the competitiveness of firms. Manufacturing processes based on Agile Manufacturing are characterized by customers supplier integrated process for...