📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 5, ISSUE 3, MARCH 2016

Securely Eradicating Duplication by Generating File Tags and Tokens over Hybrid Cloud Using Security Algorithm

Madhuri Ghodke, Priyanka Bais, Abhirupa Saha, Poonam Singh, Prof. G.M. Gaikwad

DOI: 10.17148/IJARCCE.2016.5339

Abstract: A composition of two or more clouds i.e. private and public that remains distinct entities but are bound together, providing advantages of number of deployment models is called Hybrid Cloud. Eliminating duplicate copies of repeating data to save storage can be managed by data deduplication which is a specialised data compression technique. Existing system shows that each user will be issued private keys for their corresponding privileges. These private keys can be used for generating file token for duplicate checking. However, during file uploading, the user needs to use file tokens for sharing with other users with privileges. To compute these file tokens, the user needs to know the private keys. This restriction leads the authorized deduplication system unable to be widely used and limited. This failure can be overcome by implementing block level deduplication which eliminates duplicate blocks of data that occur in non-identical files. New deduplication algorithms supporting authorized duplicate check in hybrid cloud using token number and privilege key are used such as SHA1 and AES algorithms. SHA-1 produces a 160-bit hash value known as message digest. AES algorithm will be used to convert a given plaintext of 256 bit into cipher text of 256 bits. Thus we will implement a deduplication construction supporting authorized duplicate check in hybrid cloud architecture.



Keywords: Data Owner Module, Encryption and Decryption module, Remote User Module, Cloud Server Module.

How to Cite:

[1] Madhuri Ghodke, Priyanka Bais, Abhirupa Saha, Poonam Singh, Prof. G.M. Gaikwad, “Securely Eradicating Duplication by Generating File Tags and Tokens over Hybrid Cloud Using Security Algorithm,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2016.5339