Image And Text Encrypted Data With Authorized Deduplication In Cloud
Author(s):
Suraj Sakhare, Shubham Gawade, Pritesh Shaha, Paras Jaitly
Keywords:
Abstract
In our investigation, we implement the use of role re-encryption within a secure system to address concerns related to data leakage and deduplication. The primary objective is to ensure the effectiveness of the system by verifying evidence of ownership and determining whether a user is authorized. The approach involves sharing access keys for authorized users, allowing them to access specific files without compromising personal information. To enhance security, we adopt a strategy that avoids the use of both text and digital visuals. Personal media, such as photographs, is stored across various devices like mobile phones, portable gadgets, and computers. Given the sensitive nature of these photographs, encryption is applied to maintain confidentiality. In the contemporary digital landscape, text files are equally crucial and must be securely stored on cloud servers. During the transmission of digital photographs, stringent measures are taken to safeguard them. Additionally, personal identity information, including copies of documents like a PAN card, passport, and ATM card, is consolidated and stored on a single secure platform to prevent duplication in our proposed system
Article Details
Unique Paper ID: 164755

Publication Volume & Issue: Volume 10, Issue 12

Page(s): 2628 - 2631
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 11 Issue 1

Last Date for paper submitting for Latest Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews