Improving Security for De-Duplication System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Removing duplicate data is nothing but Deduplication. De-duplication system is used in cloud computing to degrade storage space and the bandwidth of cloud. In this paper introduce some new algorithm that used for de duplication .We propose distributed systems with higher consistency in which the data chunks are sprade across many cloud servers. The security requirements of data are also achieved by introducing a deterministic secret sharing in distributed storage systems, instead of using convergent encryption as in previous systems. In this paper introduced new algorithms for de-duplication system. Cryptographic hash functions are generally used for the verification of data integrity. This paper provides an implementation of a newly selected cryptographic hash algorithm called Secure Hash Algorithm – Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model.
Authors and Affiliations
Ms. Ranjana Phapale, Prof. B. S. Chunchure
Design of Embedded Irrigation System by Using WSN
The application of embedded web technology in the remote monitoring system has given rise to the technological change in the field of industrial control. Nowadays the management of the domestic laboratories in the resea...
Three Phase Three Level ZVS DC-DC Converter with Asymmetrical Duty Cycle Control
This paper proposes development of soft switching scheme for three phase three level DC-DC converter for different duty cycles to achieve ZVS for all switches. The ZVS is achieved with output inductor and leakage induct...
Effective Relevance Feedback for Content Based Image Retrieval Using Mining Navigation Pattern and SEO Tools
with a rapid increase of images that are available in social blog and media, image annotation has evolved as an important thing due to its application in image toning and retrieval. Most studies cast image annotation in...
A Review on Planning for An Exploratory Well
A well is planned generally to ensure it is safe and economical in nature. It integrates engineering principles co-private or personal philosophies. Prospect development, data collection, pore formation, geology, casing...
Structural Health Monitoring on RCC Slab by Use of Piezoelectric Material
Piezoelectric lead zirconate titanate (PZT) is being gradually applied into practice as a new intelligent material for structural health monitoring. In order to study the damage detection properties of PZT on concrete s...