International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-4  ( Apr, 2024 )
Past issues
  1. Volume-12,Issue-3  ( Mar, 2024 )
  2. Volume-12,Issue-2  ( Feb, 2024 )
  3. Volume-12,Issue-1  ( Jan, 2024 )
  4. Volume-11,Issue-12  ( Dec, 2023 )
  5. Volume-11,Issue-11  ( Nov, 2023 )
  6. Volume-11,Issue-10  ( Oct, 2023 )
  7. Volume-11,Issue-9  ( Sep, 2023 )
  8. Volume-11,Issue-8  ( Aug, 2023 )
  9. Volume-11,Issue-7  ( Jul, 2023 )
  10. Volume-11,Issue-6  ( Jun, 2023 )

Statistics report
Jul. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 136
Paper Published : 1596
No. of Authors : 4179
  Journal Paper

Paper Title :
Deduplication on Encrypted Big Data in Cloud

Author :Nehal Pandey, Nishant Jain, Nikshay Jain, Ishita Mattoo, Neha Hajar

Article Citation :Nehal Pandey ,Nishant Jain ,Nikshay Jain ,Ishita Mattoo ,Neha Hajar , (2019 ) " Deduplication on Encrypted Big Data in Cloud " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 18-22, Volume-7, Issue-7

Abstract : Cloud computing offers a latest approach of service provision by re-arranging varied resources over the net. the foremost major and widespread cloud service is data storage. So on maintain the privacy of data holders, data area unit sometimes hold on cloud in associated degree encrypted kind. However, encrypted data introduces provocation for cloud data duplication that becomes crucial for big data storage and method in cloud. Ancient replicating schemes cannot work on encrypted information[1].They cannot exile support in- formation access management and repeal. that's why, not of them could also be immediately deployed in follow. throughout this paper, we tend to gravitate to place forward a topic to deduplicate encrypted data hold on in cloud supported freehold challenge and proxy re-encryption[6]. It integrates cloud data deduplication with access management. we tend to tend to evaluate its performance supported exhaustive analysis and laptop simulations. The results show the superior efficiency and effectiveness of the theme for potential sen-sible activity, notably for big data deduplication in cloud storage[2]. Keywords - Access Control, Big Data, Cloud Computing, Data Deduplication, Proxy Re-Encryption

Type : Research paper

Published : Volume-7, Issue-7


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 75
| Published on 2019-09-11
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World