Secure Duplication Detection in Cloud using Chunk Based Technique

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Authorised De-duplication using Convergent Encryption Technique

Sangeetha. B Department of computer science, Anna University, Chennai-63, Tamilnadu, India E-mail: [email protected] Mr.E.S.K.Vijay Anand Assistant Professor, Anna University, Chennai-63, Tamilnadu, India E-mail: [email protected] -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------Cloud computin...

متن کامل

Data De-Duplication Correction and Secure Key Authentication in Cloud

Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical issue of making convergent encryption prac...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Low Energy Error Detection Technique Using Procedure Call Duplication

This paper presents a new software technique to detect transient hardware errors. The objective of the technique is to guarantee data integrity in the presence of transient errors and to reduce energy consumption at the same time. The basic approach is to duplicate computations. There are three choices for duplicate computations: (1) duplicating every statement in the program and comparing thei...

متن کامل

Region Duplication Forgery Detection Technique Based on SURF and HAC

Region duplication forgery detection is a special type of forgery detection approach and widely used research topic under digital image forensics. In copy move forgery, a specific area is copied and then pasted into any other region of the image. Due to the availability of sophisticated image processing tools, it becomes very hard to detect forgery with naked eyes. From the forged region of an ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology

سال: 2019

ISSN: 2321-9653

DOI: 10.22214/ijraset.2019.6069