International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-8,Issue-3  ( Mar, 2020 )
Past issues
  1. Volume-8,Issue-2  ( Feb, 2020 )
  2. Volume-8,Issue-1  ( Jan, 2020 )
  3. Volume-7,Issue-12  ( Dec, 2019 )
  4. Volume-7,Issue-11  ( Nov, 2019 )
  5. Volume-7, Issue-10  ( Oct, 2019 )
  6. Volume-7, Issue-9  ( Sep, 2019 )
  7. Volume-7, Issue-8  ( Aug, 2019 )
  8. Volume-7, Issue-7  ( Jul, 2019 )
  9. Volume-7, Issue-6  ( Jun, 2019 )
  10. Volume-7, Issue-5  ( May, 2019 )

Statistics report
Jun. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 86
Paper Published : 1227
No. of Authors : 3090
  Journal Paper

Paper Title
Secure Public Cloud Authorization & De-Duplication Using Signature Based Key Policy and ECC

As the rapid data expansion of data most current years, cloud computing has turn out to be one of the furthermost accepted area in IT industry with considers to cost, proficient use of computing possessions for example storage space and system bandwidth in the cloud computing communications. Data deduplication refers to a method that reduces the unnecessary data on the storage and transmitting on the network, and is think about to be one of the most-enabling storage technologies that presents well-organized resource exploitation in the cloud computing. On the additional hand, be appropriating data deduplication acquires protection vulnerabilities in the cloud storage method so that untrusted entities including a cloud server or unauthorized users may break data confidentiality, privacy and integrity on the outsourced data. It is difficult to resolve the difficulty of data defense and confidentiality regarding data de-duplication, but positively essential for presenting amature and established cloud storage service. Here in this paper for providing Data Security Differential human rights of users in the Duplicate ensure. Also a Hybrid Cloud Architecture is implemented in which the Duplicate-check tokens of files are generated by the private cloud servers with private keys. The methodology adopted here for token creation introduces only minimal overhead during the entire upload process and is negligible for moderate file sizes. Index Terms- Cloud computing, Data Deduplication, Data Storage, Remote Data, Elliptic Curves.

Author - Divya Jain, Vivek Sharma

| PDF |
Viewed - 60
| Published on 2017-04-11
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World