ipl-logo

Traditional Secret Writing Essay

3368 Words14 Pages

DE DUPLICATION SCALABLE SECURE FILE SHARING ON CLOUD ENVIRONMENT Ms.B.Nirmala[1]

Resaerch Scholoars

Department of Computer science and Engineering

Saveetha University

Nirmalabalasundam.it@gmail.com Dr.SP.Chokkalingam

Professor Head of the department IT

Department of Information Technology

Saveetha University

chokkalingam@saveetha.com

Abstract— Data Deduplication provides lots of benefits to security and privacy issues which can arise as user 's sensitive data at risk of within and out of doors attacks.Traditional secret writing that provides knowledge confidentiality is incompatible with knowledge deduplication. Ancient secret writing wants completely different users to encode their knowledge with their own keys. Thus, identical knowledge copies of completely different various users can result in different ciphertexts that makes Deduplication not possible.Convergent secret writing has been planned to enforce knowledge confidentiality whereas creating Deduplication possible. It encrypts/decrypts a knowledge copy with a confluent key, that is obtained by …show more content…

The CA may be a world trustworthy certificate authority within the system.It sets up the system and accepts the registration of all the users and AAs within the system.For each legal user within the system,the CA assigns a worldwide distinctive user identity to that and additionally generates a worldwide public key for this user.However,the CA isn 't concerned in any attribute management and therefore the creation of secret keys that arrelated to attributes.For example,the CA may be the social insurance administration,an authority of the u. s.government.Each user are issued a social insurance number(SSN) as its world identity.Every AA is AN freelanceattribute authority that 's chargeable for entitling and revoking user’s attributes in line with their role or identity in its

More about Traditional Secret Writing Essay

Open Document