alexa Revocation and Security Based Ownership Deduplication
ISSN ONLINE(2319-8753)PRINT(2347-6710)

International Journal of Innovative Research in Science, Engineering and Technology
Open Access

Like us on: https://twitter.com/ijirset_r
OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

Revocation and Security Based Ownership Deduplication of Convergent Key Creating in Cloud

 
To read the full article Peer-reviewed Article PDF image

Abstract

Data deduplication is a technique for decreasing the amount of storage space for an organization needs to save its data. In many organizations, the storage systems have duplicate copies of many pieces of data and its information. For example, an equivalent file may be saved in several places by many users, or two or more files that aren't equivalent may still include much of the same data. Deduplication remove these extra copies by saving just one copy of the data and changing the other copies with pointers that lead back to the original copy. In this paper first attempt to conventionally address the problem of resolve dynamic and reliable key management in deduplication. In the baseline approach each user holds a separate master key for encrypting the convergent keys and redistributes them to the cloud. And we propose a method Deckey, a new construction in which users are not need to manage any keys on their own. Security analyses establish that Deckey is secure in terms of the exposition specified in the proposed security model. As a proof of concept, we implement Deckey using the Ramp secret sharing scheme and determine that Deckey acquire limited overhead on realistic environments.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords