Loading

De Duplication and Encryption of Data on Cloud
Rishabh Singh1, S.Ganesh Kumar2

1Rishabh Singh, Department of Computer Science and Engineering, SRM Institute of Engineering and Technology, Kattankulathur, Chennai (TamilNadu), India.

2S.Ganesh Kumar, Associate Professor, Department of Computer Science and Engineering, SRM Institute of Engineering and Technology, Kattankulathur, Chennai (TamilNadu), India.

Manuscript received on 08 April 2019 | Revised Manuscript received on 15 April 2019 | Manuscript Published on 26 April 2019 | PP: 448-452 | Volume-8 Issue-6S April 2019 | Retrieval Number: F60550486S19/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The duplication of information on the importance of data compression techniques to eliminate duplicate copies of repetitive information. It is widely used in the cloud save storage space and storage to reduce the amount of bandwidth. In the hold, as long as the secret of the duplication of the data supporting the sensitive, flocked to the encryption, the knowledge of the art is the divine plan, is to encrypt the front of the outsourcing. For more information security protection, this is the first project tries to address the issue formally authorized the duplication of data. Unlike traditional systems, doubling the double differential privileges of users are considered, and patterned in addition to that information. The new duplication and many buildings are present and we allowed supports duplication of control in a hybrid cloud architecture. The analysis showed that the security system is about defining a secure certain terms in the proposed security model. Proof of concept, as with any kind of work implement copy control system proposed by our test bench for experiments on our prototype. In that they show the work of our normal like very little, proposed from the above is the cause of the system proposed by the authority of the command of the head of the copy compared to it.

Keywords: For More Information Security Protection, this is the First Project tries to Address the Issue Formally Authorized the Duplication of data.
Scope of the Article: Computer Science and Its Applications