Competent Dependable Convergent Key Management for Reliable Deduplication
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
De-Duplication enhances Storage and data transmission effectiveness is contradictory with conventional encryption. In conventional model encryption requires diverse clients to encode their own information with their own expert key, in this manner indistinguishable information duplicates of distinctive clients will prompt diverse figure writings, making de-duplication incomprehensible. Each such duplicate can be characterized in view of diverse granularities: it may allude to either an entire document (i.e., record level deduplication), or information piece (i.e., square level deduplication). To applying deduplication to client information to spare support cost in cloud. Aside from typical encryption and unscrambling procedure we have proposed Master key idea with DeKey idea. For Encryption and Decryption we have utilized Triple Data Encryption Standard (3-DES) Algorithm where the plain content is encoded triple times with the key so that the information is secure and solid from programmers. We diminished the expense and time in transferring and downloading with storage room.
Authors and Affiliations
Sharmistha Biswas , S. Durga Prasad
Autograph Protocol for Wireless Sensor Networks
A wealth of innovative opportunities exists for a mobile communications solution that can reliably communicate data without the need for fixed network infrastructure. A key element of any communications system is the...
Providing Data Confidentiality of Outsourced Data In Cloud
Cloud means collection of storage servers maintained by the cloud service provider which minimizes investment cost for individual users and organizations. It provides on-demand self service, resource pooling, rapid e...
Fast Retrieval Of Unstructured Documents By Using Meta Data And Hierarchical Clustering
Several annotation systems let only “un typed” keyword annotation. For illustration, a user may interpret a weather report using a tag. There are several application domains where users make and contribute to informa...
Storage Correctness Verification and Data Regaining In Cloud
Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover users sho...
Capabilities and Limitations of Path Gain Adjustment in Harmonic Rejection Mixers
Harmonic rejection ratios (HRR) of harmonic rejection mixers (HRM) are limited because of gain and phase inaccuracies. Gain and phase calibration can be employed to enhance HRRs. This paper deals in a systematic way...