ISSN: 2349-5162

JETIREXPLORE- Search Thousands of research papers



Published in:

Volume 4 Issue 3
March-2017
eISSN: 2349-5162

Unique Identifier

JETIR1703050

Page Number

249-252

Share This Article


Title

SECURE KEY AGREEMENT TECHNIQUE FOR SHARING GROUP DATA AND OBTAIN DATA DEDUPLICATION IN CLOUD.

ISSN

2349-5162

Cite This Article

"SECURE KEY AGREEMENT TECHNIQUE FOR SHARING GROUP DATA AND OBTAIN DATA DEDUPLICATION IN CLOUD.", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.4, Issue 3, page no.249-252, March-2017, Available :http://www.jetir.org/papers/JETIR1703050.pdf

Abstract

safe together with sound data deduplication can perceptibly crop the communication and storage outlay in cloud space for storing services, and has potential application in our large data-driven society. Existing data deduplication schemes square measure naturally supposed to additionally resist brute-force attacks or ensure the strength and data convenience. This subject will deliver the products the isolation protecting and cross domain large data deduplication in cloud. Existing system has been suffer from key legal instrument disadvantage. In projected System, to urge obviate key legal instrument disavantage , we tend to tend to implement block vogue based key agreement protocol to share data in csp . It permits multiple partners to freely distribute info in cluster. within projected system, chunk base sort contract procedure to wires various partners, which could supplely expand to quantity of partners within terribly csp setting per the development of the chunk vogue. and to chop back data redundancy disadvantage we tend to tend to use data deduplication system. among that data owner will transfer file and send to cluster manager and cluster manager check data deduplication over native domain. throughout this information owner is that the approved person transfer knowledge over cloud envierment. to transfer file data owner will send key request to key authority for secret key. once receiving key from key authority data owner will transfer file and send to cluster manager and check file deduplication on native domain and if file is not offered on native domain then send file to cloud. at the time of file access, data user will send key request to any or all cluster member and once receiving key from all cluster member, file will transfer. If any malicious user entered in cluster or conceive to destruct cluster , TPA can remove malicious user from cluster. to boot, we tend to tend to require responsibleness into thought to provide higher privacy assurances than existing schemes.

Key Words

Deduplication, big data, unbiased imperfect chunk system , records distribution, CSP.

Cite This Article

"SECURE KEY AGREEMENT TECHNIQUE FOR SHARING GROUP DATA AND OBTAIN DATA DEDUPLICATION IN CLOUD.", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.4, Issue 3, page no. pp249-252, March-2017, Available at : http://www.jetir.org/papers/JETIR1703050.pdf

Publication Details

Published Paper ID: JETIR1703050
Registration ID: 221772
Published In: Volume 4 | Issue 3 | Year March-2017
DOI (Digital Object Identifier):
Page No: 249-252
ISSN Number: 2349-5162

Download Paper

Preview Article

Download Paper




Cite This Article

"SECURE KEY AGREEMENT TECHNIQUE FOR SHARING GROUP DATA AND OBTAIN DATA DEDUPLICATION IN CLOUD.", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.4, Issue 3, page no. pp249-252, March-2017, Available at : http://www.jetir.org/papers/JETIR1703050.pdf




Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00050

Print This Page