z-logo
open-access-imgOpen Access
Image and Text Encrypted Data with Authorized Deduplication in Cloud
Author(s) -
Prof. M. B. Yelpale,
V Akhil,
Devyani Sharma,
Shashank Nathe,
Aniket Lodhe
Publication year - 2022
Publication title -
international journal of advanced research in science, communication and technology
Language(s) - English
Resource type - Journals
ISSN - 2581-9429
DOI - 10.48175/ijarsct-2650
Subject(s) - encryption , computer science , data deduplication , computer security , on the fly encryption , filesystem level encryption , cloud computing , attribute based encryption , client side encryption , confidentiality , digital forensics , internet privacy , world wide web , public key cryptography , operating system
In this study, role re-encryption is employed in a secure role re-encryption system to minimize data leakage and deduplication. It also looks for evidence of ownership to see whether the user is an authorized one. This is for the sake of effectiveness. The role re-encryption approach involves sharing the access key for the associated authorized user in order to access a specific file without exposing personal information. We use both the avoid use of text and digital visuals in our endeavour. Personal photographs, for example, are stored on our mobile phones, portable devices, computers, and other gadgets. As these photographs must be kept confidential, we are encrypting them. Nowadays, the text file is equally significant for users. It must be kept safe on a cloud server. Digital photographs must be safeguarded during transmission, but personal identity information such as copies of a pan card, passport, ATM card, and so on, should be stored on a single wnpc. To minimize duplication in our proposed system, we are securing the text file and picture data.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here