JETIREXPLORE- Search Thousands of research papers



Published in:

Volume 5 Issue 4
April-2018
eISSN: 2349-5162

Unique Identifier

JETIR1804371

Page Number

878-883

Share This Article


Title

SECURE KEY AGREEMENT FOR SHARING GROUP DATA AND FIND DATA DEDUPLICATION IN CLOUD.

ISSN

2349-5162

Cite This Article

"SECURE KEY AGREEMENT FOR SHARING GROUP DATA AND FIND DATA DEDUPLICATION IN CLOUD.", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 4, page no.878-883, April-2018, Available :http://www.jetir.org/papers/JETIR1804371.pdf

Abstract

safe alongside sound information deduplication can perceptibly reduce the communication and storage outlay in cloud cupboard space services, and has potential application in our Brobdingnagian data-driven society. Existing information deduplication schemes unit naturally meant to conjointly resist brute-force attacks or make sure the strength and information convenience. This subject will deliver the products the isolation protecting and cross domain Brobdingnagian information deduplication in cloud. Existing system has been suffer from key agreement downside. In projected System, to urge eliminate key agreement downside , we have a tendency to tend to implement block vogue primarily based key agreement protocol to share information in csp . It permits multiple partners to freely distribute info in cluster. within projected system, chunk base kind contract procedure to wires varied partners, which could supplely expand to quantity of partners within terribly csp setting per the development of the chunk vogue. and to chop back information redundancy downside we have a tendency to tend to use information deduplication system. inside that information owner will transfer file and send to cluster manager and cluster manager check information deduplication over native domain. throughout this information owner is that the approved person transfer knowledge over cloud envierment. to transfer file information owner will send key request to key authority for secret key. once receiving key from key authority information owner will transfer file and send to cluster manager and check file deduplication on native domain and if file is not offered on native domain then send file to cloud. at the time of file access, information user will send key request to any or all cluster member and once receiving key from all cluster member, file will transfer. If any malicious user entered in cluster or decide to destruct cluster , TPA can subtract malicious user from cluster. in addition, we have a tendency to tend to require answerability into thought to provide higher privacy assurances than existing schemes.

Key Words

Records distribution, Secure data reduplication, big data, type contract procedure, unbiased imperfect chunk system , csp.

Cite This Article

"SECURE KEY AGREEMENT FOR SHARING GROUP DATA AND FIND DATA DEDUPLICATION IN CLOUD.", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 4, page no. pp878-883, April-2018, Available at : http://www.jetir.org/papers/JETIR1804371.pdf

Publication Details

Published Paper ID: JETIR1804371
Registration ID: 221773
Published In: Volume 5 | Issue 4 | Year April-2018
DOI (Digital Object Identifier):
Page No: 878-883
ISSN Number: 2349-5162

Download Paper

Preview Article

Download Paper




Cite This Article

"SECURE KEY AGREEMENT FOR SHARING GROUP DATA AND FIND DATA DEDUPLICATION IN CLOUD.", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 4, page no. pp878-883, April-2018, Available at : http://www.jetir.org/papers/JETIR1804371.pdf




Preview This Article


Downlaod

Click here for Article Preview