M. Jeyaselvi, C. Jayakumar, M. Sathya, S. Ibrahim, N. S. Kalyan Chakravarthy
{"title":"云环境下基于网络安全的多密钥管理系统","authors":"M. Jeyaselvi, C. Jayakumar, M. Sathya, S. Ibrahim, N. S. Kalyan Chakravarthy","doi":"10.1109/ICEET56468.2022.10007104","DOIUrl":null,"url":null,"abstract":"The revolutionary expansion in processing and storing mechanisms through the internet has given rise to affordable and powerful computing features. These qualities have been enhanced as a result of this growth. Computing in the cloud is an emerging technology that provides users with the ability to access data storage facilities as well as application access facilities in an online setting. This approach presents an almost infinite number of chances and difficulties. In light of this, ensuring the safety of one’s data and preventing the accumulation of duplicate or otherwise identical information in the cloud are both highly critical concerns that must be handled. As a result, a method known as deduplication was created to cut down on the amount of data in the identical storage system. In this investigation, a unique approach for removing repetitive or duplicate data from cloud servers, which will also help reduce the amount of internet access and storage space needed, has been presented. The results of the experiments show that the suggested system not only offers a higher level of protection for the data that is stored in stored in the cloud but also addresses the primary issues of rent systems.","PeriodicalId":241355,"journal":{"name":"2022 International Conference on Engineering and Emerging Technologies (ICEET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber security-based Multikey Management System in Cloud Environment\",\"authors\":\"M. Jeyaselvi, C. Jayakumar, M. Sathya, S. Ibrahim, N. S. Kalyan Chakravarthy\",\"doi\":\"10.1109/ICEET56468.2022.10007104\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The revolutionary expansion in processing and storing mechanisms through the internet has given rise to affordable and powerful computing features. These qualities have been enhanced as a result of this growth. Computing in the cloud is an emerging technology that provides users with the ability to access data storage facilities as well as application access facilities in an online setting. This approach presents an almost infinite number of chances and difficulties. In light of this, ensuring the safety of one’s data and preventing the accumulation of duplicate or otherwise identical information in the cloud are both highly critical concerns that must be handled. As a result, a method known as deduplication was created to cut down on the amount of data in the identical storage system. In this investigation, a unique approach for removing repetitive or duplicate data from cloud servers, which will also help reduce the amount of internet access and storage space needed, has been presented. The results of the experiments show that the suggested system not only offers a higher level of protection for the data that is stored in stored in the cloud but also addresses the primary issues of rent systems.\",\"PeriodicalId\":241355,\"journal\":{\"name\":\"2022 International Conference on Engineering and Emerging Technologies (ICEET)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Engineering and Emerging Technologies (ICEET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEET56468.2022.10007104\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Engineering and Emerging Technologies (ICEET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEET56468.2022.10007104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber security-based Multikey Management System in Cloud Environment
The revolutionary expansion in processing and storing mechanisms through the internet has given rise to affordable and powerful computing features. These qualities have been enhanced as a result of this growth. Computing in the cloud is an emerging technology that provides users with the ability to access data storage facilities as well as application access facilities in an online setting. This approach presents an almost infinite number of chances and difficulties. In light of this, ensuring the safety of one’s data and preventing the accumulation of duplicate or otherwise identical information in the cloud are both highly critical concerns that must be handled. As a result, a method known as deduplication was created to cut down on the amount of data in the identical storage system. In this investigation, a unique approach for removing repetitive or duplicate data from cloud servers, which will also help reduce the amount of internet access and storage space needed, has been presented. The results of the experiments show that the suggested system not only offers a higher level of protection for the data that is stored in stored in the cloud but also addresses the primary issues of rent systems.