Secure De-Duplication using Convergent Keys (Convergent Cryptography) for Cloud Storage
نویسندگان
چکیده
منابع مشابه
Secure De-Duplication using Convergent Keys (Convergent Cryptography) for Cloud Storage
One very important challenges of today’s cloud storage services is that the management of the ever-increasing amount of data. To create data management scalable, de-duplication has been a widely known technique to condense space for storing and transfer information measure in cloud storage. Rather than keeping multiple data copies with an equivalent content, de-duplication eliminates redundant ...
متن کاملSecure Authorised De-duplication using Convergent Encryption Technique
Sangeetha. B Department of computer science, Anna University, Chennai-63, Tamilnadu, India E-mail: [email protected] Mr.E.S.K.Vijay Anand Assistant Professor, Anna University, Chennai-63, Tamilnadu, India E-mail: [email protected] -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------Cloud computin...
متن کاملBlock Level De-duplication Check for Shared Data on Hybrid Cloud using Convergent Key
In regards to increase in use of digital information users prefer to store information in cloud system. In cloud storage system many users can store same type of data leading to data duplication causing a high utilization of bandwidth. Some techniques are proposed for making cloud more efficient and effective regarding to storage and bandwidth. In current time data de-duplication is effective t...
متن کاملSecure Data Storage with Deduplication and Efficient Convergent Key Management
Businesses and consumers are becoming increasingly conscious of the value of secure archival data storage. Most of the organization need to outsource their confidential data including sensitive information to cloud. One of the greatest challenge todays cloud storage services facing is the management of ever increasing volume of data and most importantly security. This paper introduces a techniq...
متن کاملID-Based Cryptography for Secure Cloud Data Storage
This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/ijca2015906198