Secure Encrypted Data with Authorized Deduplication
Conference: 3rd International Conference on Innovations in Electrical, Information and Communication Engineering
AbstractData deduplication is a vital technique to compress a data for eradicating duplicate\ndata. It is utilized broadly to handle the storage space effectively and helps in saving bandwidth\nand to safeguard the truthfulness of delicate data. Traditional encryption will end in multiple\ndifferent ciphertexts produced from the same plaintext by different uses secret keys, which hiders\ndata deduplication. In Secure hash algorithm which generates a hash code for each document and\nby comparing the hash code with the previously stored documents, once the code matched, instead\nof storing the document in the memory space the file is mapped to a specific field using mapping\ntechnique. This method gives more secure way to store data effectively. |
ICIEICE - 2021![]() |