Open Access Journal

ISSN : 2456-1304 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Science Engineering and Management (IJSEM)

Monthly Journal for Science Engineering and Management

ISSN : 2456-1304 (Online)

De-duplication and Security Using 3D AES over Cloud

Author : Renuka C. Deshpande 1 S. S. Ponde 2

Date of Publication :20th February 2018

Abstract: De-duplication process is being mostly used in cloud server space to shrink the quantity of server space and reduce network bandwidth. To eradicate duplicate pieces of repeat data, Data de-duplication is exclusive data compression proposal used. To protect the confidentiality & isolation of receptive data while supporting de-duplication, the convergent encryption method has been proposed to encrypt data before outsourcing. For healthier data defense, this manuscript takes the primary effort to properly deal with the difficulty of certified data de-duplication. Apart from usual de-duplication structure, the differential rights concept for users has further measured in replica check moreover the records itself. There are numerous novel de-duplication constructions supporting certified replica check in fusion cloud architecture. Security investigations express that our proposal is secure in conditions of the characterization specified in the proposed security representation. As an evidence of conception, we implement a trial product of our future certified duplicate check scheme and conduct testbed experiments using our trial product. We include SHA-1 algorithm to de-duplicate data, IBE for the authentication of users. We also enhanced the security of cloud data by using symmetric algorithms i.e. Modified (3D) AES with least operating cost evaluate to previous research operations. The proposed results find that the storage, speed and security have been increased compared to previous research operations

Reference :

    1.  Guljar P. Shaikh1, S. D. Chaudhary, Priyanka Paygude, Debnath Bhattacharyya “Achieving secure deduplication by using private cloud and public cloud”-International Journal of Security and Its Applications Vol. 10, No. 5 (2016) pp.17-26 2016
    2. B. Aparna, Prof K. S. M. V Kumar “Privacy preserving and Authorized data Deduplication in public cloud framework,”- International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 10, October-2015.
    3. Prof. N.B. Kadu, Mr. Amit Tickoo, Mr.Saurabh I. Patil, Mr. Nilesh B. Bhagat, Mr. Ganesh B. Divte “A hybrid Cloud approach for secure Authorized deduplication”- International Journal of Scientific and Research Publications, Volume 5, Issue 4, April 2015.
    4.  Sumedha A. Telkar (S. A. Maindakar) 1, Dr M Z Shaikh “secured and efficient cloud storage data deduplication system”- International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 1, January 2016.
    5.  Rushikesh Naiknaware, Omkar Deshpande, Abhishek Kangle, Himalay Koli, Dipmala Salunke “A hybrid approach for secure authorised deduplication”- International Journal of Innovative Research in Science, Engineering and Technology Vol. 5, Issue 5, May 2016.
    6. Jin Li, jingwei Li,Xiaofeng Chen,Chunfu jia and wenjing Lou “identity-based Encryption with outsourced revocation in Cloud Computing”- IEEE TRANSACTIONS ON COMPUTERS.

Recent Article