Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/343496
Title: | Enhanced secure content Deduplication using effective hash Function and chunking logarithm |
Researcher: | Periasamy J K |
Guide(s): | Latha B |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Deduplication HashFunction |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Data Deduplication is one of trending data compression mechanism to remove duplicate copies of repeated data, and widely used in cloud storage server which reduces the unwanted utilized memory space and helps to identify the right owner of the content in the cloud. If there is only one copy of each data file stored in the cloud, the cloud has huge quantity of cloud users who own such data file. The existing method discusses a convergent encryption technique to solve the Deduplication problem. Convergent Encryption technique encrypts an input file with the hash value of the input file as an encryption key. The ciphertext is given to the server and the user retains the encryption key. Since convergent encryption is deterministic, identical files are always encrypted into identical ciphertext, regardless of who encrypts them. However, the method does not assure consistency, reliability and confidentiality in cloud. Similar or different cloud users store duplicated file in the cloud server, where cloud storage utilizes high volume of storage.To find a solution for the above problems, the work introduces Enhanced Secure Content Deduplication Identification and Prevention (ESCDIP) Algorithm to enhance the file-level and content-level Deduplication detection of encoded data with reliability in cloud environment. Every cloud user s files contain an independent master key for encryption using ESCDIP technique and outsource data into the cloud. It reduces the overheads that are associated with the interactive duplication detection and query processes. The proposed work identifies the unique data chunks to store in the cloud. When data owner is changed or new data owner is added to the group owner list, the encryption key is updated. The encrypted rekeying message acts as vital role to secure the content. newline |
Pagination: | xviii,148p |
URI: | http://hdl.handle.net/10603/343496 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 59.77 kB | Adobe PDF | View/Open |
02_certificates.pdf | 187.21 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 648.42 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 445.33 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 154.16 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 516.67 kB | Adobe PDF | View/Open | |
07_contents.pdf | 96.76 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 13.96 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 16.19 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 28.04 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 614.07 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 377.46 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 1.07 MB | Adobe PDF | View/Open | |
14_chapter4.pdf | 766.12 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 658.44 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 90.08 kB | Adobe PDF | View/Open | |
17_references.pdf | 269.63 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 434.92 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 158.5 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: