Encryption to Decryption Statistics for Secure Data with Independent Servers for Deduplication
Mohd Akbar1, K. E. Balachandrudu2, Prasadu Peddi3

1Mohd Akbar Research Scholar*, Shri JJT University, (Rajasthan) India.
2Dr. K. E. Balachandrudu, Principal, Malla Reddy ENG CLG, Hyderabad India.
3Dr. Prasadu Peddi, Assistant Professor, Shri JJT University, (Rajasthan) India.
Manuscript received on September 23, 2019. | Revised Manuscript received on October 15, 2019. | Manuscript published on October 30, 2019. | PP: 6490-6493 | Volume-9 Issue-1, October 2019 | Retrieval Number: A1068109119/2019©BEIESP | DOI: 10.35940/ijeat.A1068.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Encoding information on the customer side before transferring it to distributed storage is fundamental for ensuring clients’ protection. Anyway customer side encryption is inconsistent with the standard routine with regards to deduplication in distributed storage administrations. Deduplication of records on the capacity servers has been very much clarified on different arrangements which utilized autonomous servers. An answer has been proposed considering customer side encryption and server side deduplication and guaranteeing security while utilizing a solitary server for the entire procedure. This arrangement was tended to at record level and had the thought to actualize square level deduplication utilizing a similar deduplication convention. We examined the odds of executing square level deduplication considering the single server record level deduplication plan of the base convention. We executed and examined this situation and played out an unpleasant examination with the record level deduplication by recreation. Both the plans appeared to be similar. We exhibit that our plan gives preferable security ensures over past efforts. We present the main secure cross-client deduplication plot that supports customer side encryption without requiring any extra autonomous servers. Curiously, the plan depends on utilizing a PAKE (secret word confirmed key trade) convention.
Keywords: Deduplication, Encryption, File level deduplication, Independent Servers, Hashing.