Improving Security for De-Duplication System

Abstract

Removing duplicate data is nothing but Deduplication. De-duplication system is used in cloud computing to degrade storage space and the bandwidth of cloud. In this paper introduce some new algorithm that used for de duplication .We propose distributed systems with higher consistency in which the data chunks are sprade across many cloud servers. The security requirements of data are also achieved by introducing a deterministic secret sharing in distributed storage systems, instead of using convergent encryption as in previous systems. In this paper introduced new algorithms for de-duplication system. Cryptographic hash functions are generally used for the verification of data integrity. This paper provides an implementation of a newly selected cryptographic hash algorithm called Secure Hash Algorithm – Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model.

Authors and Affiliations

Ms. Ranjana Phapale, Prof. B. S. Chunchure

Keywords

Related Articles

Design of Embedded Irrigation System by Using WSN

The application of embedded web technology in the remote monitoring system has given rise to the technological change in the field of industrial control. Nowadays the management of the domestic laboratories in the resea...

Three Phase Three Level ZVS DC-DC Converter with Asymmetrical Duty Cycle Control

This paper proposes development of soft switching scheme for three phase three level DC-DC converter for different duty cycles to achieve ZVS for all switches. The ZVS is achieved with output inductor and leakage induct...

Effective Relevance Feedback for Content Based Image Retrieval Using Mining Navigation Pattern and SEO Tools

with a rapid increase of images that are available in social blog and media, image annotation has evolved as an important thing due to its application in image toning and retrieval. Most studies cast image annotation in...

A Review on Planning for An Exploratory Well

A well is planned generally to ensure it is safe and economical in nature. It integrates engineering principles co-private or personal philosophies. Prospect development, data collection, pore formation, geology, casing...

Structural Health Monitoring on RCC Slab by Use of Piezoelectric Material

Piezoelectric lead zirconate titanate (PZT) is being gradually applied into practice as a new intelligent material for structural health monitoring. In order to study the damage detection properties of PZT on concrete s...

Download PDF file
  • EP ID EP22024
  • DOI -
  • Views 224
  • Downloads 6

How To Cite

Ms. Ranjana Phapale, Prof. B. S. Chunchure (2016). Improving Security for De-Duplication System. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(4), -. https://europub.co.uk/articles/-A-22024