నైరూప్య

Revocation and Security Based Ownership Deduplication of Convergent Key Creating in Cloud

P.Gokulraj , K.Kiruthika Devi

Data deduplication is a technique for decreasing the amount of storage space for an organization needs to save its data. In many organizations, the storage systems have duplicate copies of many pieces of data and its information. For example, an equivalent file may be saved in several places by many users, or two or more files that aren't equivalent may still include much of the same data. Deduplication remove these extra copies by saving just one copy of the data and changing the other copies with pointers that lead back to the original copy. In this paper first attempt to conventionally address the problem of resolve dynamic and reliable key management in deduplication. In the baseline approach each user holds a separate master key for encrypting the convergent keys and redistributes them to the cloud. And we propose a method Deckey, a new construction in which users are not need to manage any keys on their own. Security analyses establish that Deckey is secure in terms of the exposition specified in the proposed security model. As a proof of concept, we implement Deckey using the Ramp secret sharing scheme and determine that Deckey acquire limited overhead on realistic environments.

నిరాకరణ: ఈ సారాంశం ఆర్టిఫిషియల్ ఇంటెలిజెన్స్ టూల్స్ ఉపయోగించి అనువదించబడింది మరియు ఇంకా సమీక్షించబడలేదు లేదా నిర్ధారించబడలేదు

ఇండెక్స్ చేయబడింది

Academic Keys
ResearchBible
CiteFactor
కాస్మోస్ IF
RefSeek
హమ్దార్డ్ విశ్వవిద్యాలయం
వరల్డ్ కేటలాగ్ ఆఫ్ సైంటిఫిక్ జర్నల్స్
విద్వాంసుడు
ఇంటర్నేషనల్ ఇన్నోవేటివ్ జర్నల్ ఇంపాక్ట్ ఫ్యాక్టర్ (IIJIF)
ఇంటర్నేషనల్ ఇన్స్టిట్యూట్ ఆఫ్ ఆర్గనైజ్డ్ రీసెర్చ్ (I2OR)
కాస్మోస్

మరిన్ని చూడండి