Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/343496
Title: Enhanced secure content Deduplication using effective hash Function and chunking logarithm
Researcher: Periasamy J K
Guide(s): Latha B
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
Deduplication
HashFunction
University: Anna University
Completed Date: 2020
Abstract: Data Deduplication is one of trending data compression mechanism to remove duplicate copies of repeated data, and widely used in cloud storage server which reduces the unwanted utilized memory space and helps to identify the right owner of the content in the cloud. If there is only one copy of each data file stored in the cloud, the cloud has huge quantity of cloud users who own such data file. The existing method discusses a convergent encryption technique to solve the Deduplication problem. Convergent Encryption technique encrypts an input file with the hash value of the input file as an encryption key. The ciphertext is given to the server and the user retains the encryption key. Since convergent encryption is deterministic, identical files are always encrypted into identical ciphertext, regardless of who encrypts them. However, the method does not assure consistency, reliability and confidentiality in cloud. Similar or different cloud users store duplicated file in the cloud server, where cloud storage utilizes high volume of storage.To find a solution for the above problems, the work introduces Enhanced Secure Content Deduplication Identification and Prevention (ESCDIP) Algorithm to enhance the file-level and content-level Deduplication detection of encoded data with reliability in cloud environment. Every cloud user s files contain an independent master key for encryption using ESCDIP technique and outsource data into the cloud. It reduces the overheads that are associated with the interactive duplication detection and query processes. The proposed work identifies the unique data chunks to store in the cloud. When data owner is changed or new data owner is added to the group owner list, the encryption key is updated. The encrypted rekeying message acts as vital role to secure the content. newline
Pagination: xviii,148p
URI: http://hdl.handle.net/10603/343496
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File59.77 kBAdobe PDFView/Open
02_certificates.pdf187.21 kBAdobe PDFView/Open
03_vivaproceedings.pdf648.42 kBAdobe PDFView/Open
04_bonafidecertificate.pdf445.33 kBAdobe PDFView/Open
05_abstracts.pdf154.16 kBAdobe PDFView/Open
06_acknowledgements.pdf516.67 kBAdobe PDFView/Open
07_contents.pdf96.76 kBAdobe PDFView/Open
08_listoftables.pdf13.96 kBAdobe PDFView/Open
09_listoffigures.pdf16.19 kBAdobe PDFView/Open
10_listofabbreviations.pdf28.04 kBAdobe PDFView/Open
11_chapter1.pdf614.07 kBAdobe PDFView/Open
12_chapter2.pdf377.46 kBAdobe PDFView/Open
13_chapter3.pdf1.07 MBAdobe PDFView/Open
14_chapter4.pdf766.12 kBAdobe PDFView/Open
15_chapter5.pdf658.44 kBAdobe PDFView/Open
16_conclusion.pdf90.08 kBAdobe PDFView/Open
17_references.pdf269.63 kBAdobe PDFView/Open
18_listofpublications.pdf434.92 kBAdobe PDFView/Open
80_recommendation.pdf158.5 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: