Secure Encrypted Data with Authorized Deduplication

Conference: 3rd International Conference on Innovations in Electrical, Information and Communication Engineering
Author(s): A. Noble Marry Juliet, N. Senthil Madasamy, N. Hari Priya, N. Suba Rani Year: 2021
Grenze ID: 02.ICIEICE.2021.1.6 Page: 36-41

Abstract

Data deduplication is a vital technique to compress a data for eradicating duplicate\ndata. It is utilized broadly to handle the storage space effectively and helps in saving bandwidth\nand to safeguard the truthfulness of delicate data. Traditional encryption will end in multiple\ndifferent ciphertexts produced from the same plaintext by different uses secret keys, which hiders\ndata deduplication. In Secure hash algorithm which generates a hash code for each document and\nby comparing the hash code with the previously stored documents, once the code matched, instead\nof storing the document in the memory space the file is mapped to a specific field using mapping\ntechnique. This method gives more secure way to store data effectively.

<< BACK

ICIEICE - 2021