Novel De-duplication Technique for Supporting Differential Privileges Check in H-Cloud

Abstract

Clients are benefited storing their data in Cloud instead of local data management. But one critical challenge of cloud storage is management of huge volumes of data and lack of privacy and security which maximizes the storage space and bandwidth. Existing techniques providing data confidentiality but not supporting efficient security and data deduplication. We present authorized data deduplication technique for hybrid cloud which excludes duplication copies of repeated data. To protect confidentiality of user sensitive data efficient encryption, decryption Techniques are proposed. Finally our projected method shows minimum Communication overhead and efficient security and privacy.

Authors and Affiliations

R. Niteesh, N. Sujatha Kumari

Keywords

Related Articles

An approach of Regression testing for Service Oriented Architecture

Service Oriented Architecture (SOA) is an application architecture in which services are described using a description language. It has changed the way business enterprises with technology with a very fast demand of r...

Heterogeneous Framework for Indian Cybercrime Cases

The internet has served as the global language of the virtual world since the beginning of the digital world and the Internet in India is increasing rapidly .Internet served seriously in many more areas in current sc...

Enhanced Sparse Coding Technique For Top Image List

Image reranking is successful for enhancing the execution of a content based picture seek. Be that as it may, existing reranking algorithms are constrained for two principle reasons: 1) the literary meta-information...

Providing Privacy For Sensitive Data In Relational Database With Imprecision Bounds

The perception of privacy-preservation for receptive data can necessitate the enforcement of privacy policies or the fortification against uniqueness revelation by rewarding some privacy requirements. In this paper w...

Addressing MDX Injection issue in Big Data using ASCII Based String Matching

MDX injection is one of the most threats for application written for Web. Big data is the ability of providing exponential growth and availability of data. Since the data in here are unstructured and therefore normal...

Download PDF file
  • EP ID EP28231
  • DOI -
  • Views 249
  • Downloads 2

How To Cite

R. Niteesh, N. Sujatha Kumari (2015). Novel De-duplication Technique for Supporting Differential Privileges Check in H-Cloud. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28231