Call For Paper

Volume 10 Issue 4

April 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

A SECURE AES BASED DATA DE-DUPLICATION TECHNIQUE USING INVERTED INDEX IN CLOUD COMPUTING

Author(s):

Mr.Liladhar M. Kuwar

Keywords:

Cloud computing .Data De-duplication, Inverted – Index,tf-idf, markle hash fuction, AES Security Algorithm.

Abstract

Cloud computing comes throughout focus development of grid computing, virtualization as well as web technologies. Cloud Computing technology that interrelates between applicant and businesses to use web services without an installation. All the web services uses by business and applicant can access the information and files at any computer system having an internet connection. Cloud computing utilizes both central remote servers and internet to manage the data and applications with use of internet technology. With a lot of benefit of cloud such as scalability, accessibility, cost saving world user tend to shift their data to cloud storage. In this paper we are removing duplicate data to save storage space and increase storage speed of network. Hear we applied inverted index technique and tf-idf to identify duplicate data in cloud environment. Once de duplication is achieved system design for secure data transformation in network. Cryptography is common approach to protect the information in Cloud. Encryption algorithm plays a main role in information security system. Security is achieved throw encryption and decryption on data. In this paper we examine secure de duplication technique.. After removal of duplicate data markle hash tree applied.

Other Details

Paper ID: IJSARTV
Published in: Volume : 3, Issue : 1
Publication Date: 1/2/2017

Article Preview




Download Article