International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-11,Issue-5  ( May, 2023 )
Past issues
  1. Volume-11,Issue-4  ( Apr, 2023 )
  2. Volume-11,Issue-3  ( Mar, 2023 )
  3. Volume-11,Issue-2  ( Feb, 2023 )
  4. Volume-11,Issue-1  ( Jan, 2023 )
  5. Volume-10,Issue-12  ( Dec, 2022 )
  6. Volume-10,Issue-11  ( Nov, 2022 )
  7. Volume-10,Issue-10  ( Oct, 2022 )
  8. Volume-10,Issue-9  ( Sep, 2022 )
  9. Volume-10,Issue-8  ( Aug, 2022 )
  10. Volume-10,Issue-7  ( Jul, 2022 )

Statistics report
Oct. 2023
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 125
Paper Published : 1491
No. of Authors : 3833
  Journal Paper

Paper Title :
Secure Public Cloud Authorization & De-Duplication Using Signature Based Key Policy and ECC

Author :Divya Jain, Vivek Sharma

Article Citation :Divya Jain ,Vivek Sharma , (2017 ) " Secure Public Cloud Authorization & De-Duplication Using Signature Based Key Policy and ECC " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 27-34, Volume-5, Issue-2

Abstract : As the rapid data expansion of data most current years, cloud computing has turn out to be one of the furthermost accepted area in IT industry with considers to cost, proficient use of computing possessions for example storage space and system bandwidth in the cloud computing communications. Data deduplication refers to a method that reduces the unnecessary data on the storage and transmitting on the network, and is think about to be one of the most-enabling storage technologies that presents well-organized resource exploitation in the cloud computing. On the additional hand, be appropriating data deduplication acquires protection vulnerabilities in the cloud storage method so that untrusted entities including a cloud server or unauthorized users may break data confidentiality, privacy and integrity on the outsourced data. It is difficult to resolve the difficulty of data defense and confidentiality regarding data de-duplication, but positively essential for presenting amature and established cloud storage service. Here in this paper for providing Data Security Differential human rights of users in the Duplicate ensure. Also a Hybrid Cloud Architecture is implemented in which the Duplicate-check tokens of files are generated by the private cloud servers with private keys. The methodology adopted here for token creation introduces only minimal overhead during the entire upload process and is negligible for moderate file sizes. Index Terms- Cloud computing, Data Deduplication, Data Storage, Remote Data, Elliptic Curves.

Type : Research paper

Published : Volume-5, Issue-2


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 73
| Published on 2017-04-11
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World