Abstract

Database re-appropriating is a common circulated registering perspective that empowers data owners to misuse its on-request accumulating and computational assets. The guideline challenge is keeping up the data arrangement concerning entrusted parties. We propose a combination of triple randomized algorithms namely 3DES, AES, Blowfish. The data owner can select between the encryption methods which is suitable. As each of the algorithms takes a different block size as input and also has various key sizes. Another issue that arises is the redundancy of data. When many copies of identical data are stored, the storage size decreases, and large storage space is required. Here data reduplication technique, which is used to identify duplicate files using the hash code value method for better storage space.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.