Image And Text Encrypted Data With Authorized Deduplication In Cloud

  • Unique Paper ID: 164755
  • PageNo: 2628-2631
  • Abstract:
  • In our investigation, we implement the use of role re-encryption within a secure system to address concerns related to data leakage and deduplication. The primary objective is to ensure the effectiveness of the system by verifying evidence of ownership and determining whether a user is authorized. The approach involves sharing access keys for authorized users, allowing them to access specific files without compromising personal information. To enhance security, we adopt a strategy that avoids the use of both text and digital visuals. Personal media, such as photographs, is stored across various devices like mobile phones, portable gadgets, and computers. Given the sensitive nature of these photographs, encryption is applied to maintain confidentiality. In the contemporary digital landscape, text files are equally crucial and must be securely stored on cloud servers. During the transmission of digital photographs, stringent measures are taken to safeguard them. Additionally, personal identity information, including copies of documents like a PAN card, passport, and ATM card, is consolidated and stored on a single secure platform to prevent duplication in our proposed system

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{164755,
        author = {Suraj Sakhare and Shubham Gawade and Pritesh Shaha and Paras Jaitly},
        title = {Image And Text Encrypted Data With Authorized Deduplication In Cloud},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {10},
        number = {12},
        pages = {2628-2631},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=164755},
        abstract = {In our investigation, we implement the use of role re-encryption within a secure system to address concerns related to data leakage and deduplication. The primary objective is to ensure the effectiveness of the system by verifying evidence of ownership and determining whether a user is authorized. The approach involves sharing access keys for authorized users, allowing them to access specific files without compromising personal information. To enhance security, we adopt a strategy that avoids the use of both text and digital visuals. Personal media, such as photographs, is stored across various devices like mobile phones, portable gadgets, and computers. Given the sensitive nature of these photographs, encryption is applied to maintain confidentiality. In the contemporary digital landscape, text files are equally crucial and must be securely stored on cloud servers. During the transmission of digital photographs, stringent measures are taken to safeguard them. Additionally, personal identity information, including copies of documents like a PAN card, passport, and ATM card, is consolidated and stored on a single secure platform to prevent duplication in our proposed system},
        keywords = {},
        month = {},
        }

Cite This Article

Sakhare, S., & Gawade, S., & Shaha, P., & Jaitly, P. (). Image And Text Encrypted Data With Authorized Deduplication In Cloud. International Journal of Innovative Research in Technology (IJIRT), 10(12), 2628–2631.

Related Articles